General

  • Target

    instrument indenture_12.20.doc

  • Size

    74KB

  • Sample

    201207-y1lfxx8ag2

  • MD5

    9afbe47292bfd00a63dab5ab0e566a36

  • SHA1

    1e34087c2729ebe48d5022dc4eec1cf5eb07e8aa

  • SHA256

    64de1f3425d0aa59ad9c6b59a2e7f0510248458c6bbf7755d7770030438a31cc

  • SHA512

    614489eb44b42f119e7205042cb7619cedf3d87395bb7f30bf1d30ca9b1a30252508c2d09a0f0c17e870b8378e7bddb4fc37563e16d1b6f8657ba601ebdc7330

Score
10/10

Malware Config

Targets

    • Target

      instrument indenture_12.20.doc

    • Size

      74KB

    • MD5

      9afbe47292bfd00a63dab5ab0e566a36

    • SHA1

      1e34087c2729ebe48d5022dc4eec1cf5eb07e8aa

    • SHA256

      64de1f3425d0aa59ad9c6b59a2e7f0510248458c6bbf7755d7770030438a31cc

    • SHA512

      614489eb44b42f119e7205042cb7619cedf3d87395bb7f30bf1d30ca9b1a30252508c2d09a0f0c17e870b8378e7bddb4fc37563e16d1b6f8657ba601ebdc7330

    Score
    10/10
    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks