General

  • Target

    particulars 12.20.doc

  • Size

    91KB

  • Sample

    201210-17fqd7jngn

  • MD5

    5ce909920e6006b358ebe30b37880aa4

  • SHA1

    cbbbd2f5f1702853ca5b7cceae280d92b5d3d245

  • SHA256

    c4275b08193c896015c7bcda2a4e0d940331b0806c6b32a68e32acbf78988075

  • SHA512

    20254b6b3c8e1b878570fcb4f19dd526e44f4763254d0255d74101e45232c72a6c31e55b7c0f59aa17069eb2f8d78d15dc5d263a9a45a29c215642c51f51ea99

Score
10/10

Malware Config

Targets

    • Target

      particulars 12.20.doc

    • Size

      91KB

    • MD5

      5ce909920e6006b358ebe30b37880aa4

    • SHA1

      cbbbd2f5f1702853ca5b7cceae280d92b5d3d245

    • SHA256

      c4275b08193c896015c7bcda2a4e0d940331b0806c6b32a68e32acbf78988075

    • SHA512

      20254b6b3c8e1b878570fcb4f19dd526e44f4763254d0255d74101e45232c72a6c31e55b7c0f59aa17069eb2f8d78d15dc5d263a9a45a29c215642c51f51ea99

    Score
    10/10
    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks