General

  • Target

    docs.11.20.doc

  • Size

    142KB

  • Sample

    201130-k545cfw2qe

  • MD5

    890fb20620c85b7c1d83453adb10f315

  • SHA1

    3668152ac9d6a18e9b5c6768ae04f7ee89fa0290

  • SHA256

    68c8650b6fb677494afb0403752f15b92351fa9cf56fd7a9ac7686f63d7930fc

  • SHA512

    6097814f9d7a83c6d14e15f34c4aaede7a0e4f4d0f0afa634022377bbc4b33ee392e2fa53986e59e863d92da4b0a13d1f9823350366ad7b1f6898f70a5e31d9b

Score
10/10

Malware Config

Targets

    • Target

      docs.11.20.doc

    • Size

      142KB

    • MD5

      890fb20620c85b7c1d83453adb10f315

    • SHA1

      3668152ac9d6a18e9b5c6768ae04f7ee89fa0290

    • SHA256

      68c8650b6fb677494afb0403752f15b92351fa9cf56fd7a9ac7686f63d7930fc

    • SHA512

      6097814f9d7a83c6d14e15f34c4aaede7a0e4f4d0f0afa634022377bbc4b33ee392e2fa53986e59e863d92da4b0a13d1f9823350366ad7b1f6898f70a5e31d9b

    Score
    10/10
    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks