General

  • Target

    rule_12.09.2020.doc

  • Size

    90KB

  • Sample

    201210-nlegtwdnqs

  • MD5

    8ac8cf4ede5bb1df296c8933b31ba1a2

  • SHA1

    b7392463d4f63bd4e1fab371a44a4d1a3a9a04d6

  • SHA256

    827fb38b70c105c9b5c7855942a787e057a26b51ba63b20410eba23f3ed59545

  • SHA512

    0f01020f3b7c9cf288a3ebc015b20d5405e976ce95c18f64f2c6aec8614690ffb83eb92b11152994bd236eb5681a26cf9ff0e62f84420cb6d69c5ea0b5300a1b

Score
10/10

Malware Config

Targets

    • Target

      rule_12.09.2020.doc

    • Size

      90KB

    • MD5

      8ac8cf4ede5bb1df296c8933b31ba1a2

    • SHA1

      b7392463d4f63bd4e1fab371a44a4d1a3a9a04d6

    • SHA256

      827fb38b70c105c9b5c7855942a787e057a26b51ba63b20410eba23f3ed59545

    • SHA512

      0f01020f3b7c9cf288a3ebc015b20d5405e976ce95c18f64f2c6aec8614690ffb83eb92b11152994bd236eb5681a26cf9ff0e62f84420cb6d69c5ea0b5300a1b

    Score
    10/10
    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks