General

  • Target

    ordain,12.20.doc

  • Size

    90KB

  • Sample

    201210-lgq69pb9ee

  • MD5

    3415af9a57cbcbf2e3a18e7dc021f2ef

  • SHA1

    3f45ea6dd0d5108f3d4697a0cc368f7f210d14d4

  • SHA256

    fb78f78b3a35febc164afbacc6eb2c1a9579555940a8427ffc44706aee4bfd5e

  • SHA512

    6428a0ad3db00469d9e68e07f89bbfc9068cc3189147abaf5d15f8e934af2414e4cf367557da571602eb0f31d654a75e206a03984ba674030bdd98851c5affd1

Score
10/10

Malware Config

Targets

    • Target

      ordain,12.20.doc

    • Size

      90KB

    • MD5

      3415af9a57cbcbf2e3a18e7dc021f2ef

    • SHA1

      3f45ea6dd0d5108f3d4697a0cc368f7f210d14d4

    • SHA256

      fb78f78b3a35febc164afbacc6eb2c1a9579555940a8427ffc44706aee4bfd5e

    • SHA512

      6428a0ad3db00469d9e68e07f89bbfc9068cc3189147abaf5d15f8e934af2414e4cf367557da571602eb0f31d654a75e206a03984ba674030bdd98851c5affd1

    Score
    10/10
    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks