General

  • Target

    dictate,12.07.2020.doc

  • Size

    74KB

  • Sample

    201207-4w9hwbz6za

  • MD5

    5b14a94211accca8f8a1ff5817af10f4

  • SHA1

    f52cffebeda9aba7ddea487b71b5b689ab0212f4

  • SHA256

    385794d14430b56014a7ec11add05404f0038dc39b6e0f6617c67a13128e176a

  • SHA512

    ffb1e76deca20465b5c13999a6fbe5ebcb4fff858aaf7beffb4c08c79704c9623b214000e410b96b478b1edfa19825f0ff1125da68255e3b1bf6432151948d45

Score
10/10

Malware Config

Targets

    • Target

      dictate,12.07.2020.doc

    • Size

      74KB

    • MD5

      5b14a94211accca8f8a1ff5817af10f4

    • SHA1

      f52cffebeda9aba7ddea487b71b5b689ab0212f4

    • SHA256

      385794d14430b56014a7ec11add05404f0038dc39b6e0f6617c67a13128e176a

    • SHA512

      ffb1e76deca20465b5c13999a6fbe5ebcb4fff858aaf7beffb4c08c79704c9623b214000e410b96b478b1edfa19825f0ff1125da68255e3b1bf6432151948d45

    Score
    10/10
    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks