General

  • Target

    commerce ,12.09.2020.doc

  • Size

    76KB

  • Sample

    201210-abktff3w3e

  • MD5

    e4ed13e9bb520ca239f22b0975635375

  • SHA1

    aecceac8f470893170663aff507e9a93581442f8

  • SHA256

    79d039cacf9d5c4011b56709c53de1a8be20010484a69d118ac91fcce6f2c253

  • SHA512

    b5320be82f5d2ad1e0192ec6cf6f8821162fb997fab329f373d73df51fe35a5ec648eb3495434658f723fb72e6ac20d6ca28c6bd5700aad9afca0956e49fd881

Score
10/10

Malware Config

Targets

    • Target

      commerce ,12.09.2020.doc

    • Size

      76KB

    • MD5

      e4ed13e9bb520ca239f22b0975635375

    • SHA1

      aecceac8f470893170663aff507e9a93581442f8

    • SHA256

      79d039cacf9d5c4011b56709c53de1a8be20010484a69d118ac91fcce6f2c253

    • SHA512

      b5320be82f5d2ad1e0192ec6cf6f8821162fb997fab329f373d73df51fe35a5ec648eb3495434658f723fb72e6ac20d6ca28c6bd5700aad9afca0956e49fd881

    Score
    10/10
    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks