General

  • Target

    charge-12.20.doc

  • Size

    90KB

  • Sample

    201210-sdk1m4lsra

  • MD5

    76197f6d42cd64acde1972d4a52ae82d

  • SHA1

    71654b1ae3657a9f18b97fd7a26cfda4e67b0988

  • SHA256

    55d904b83f04acb4118df9b2bd3ebbd44b9553b0aabcfff7b68d674ddb6052cc

  • SHA512

    c7f2c95d6f02885403c88f549f14ee8fd8efde905f8b42362857b0c8c9f83e7b4bbe09f7933184f931049aba25d1112bac6fd488f95eebc94b75badc09cf3b8c

Score
10/10

Malware Config

Targets

    • Target

      charge-12.20.doc

    • Size

      90KB

    • MD5

      76197f6d42cd64acde1972d4a52ae82d

    • SHA1

      71654b1ae3657a9f18b97fd7a26cfda4e67b0988

    • SHA256

      55d904b83f04acb4118df9b2bd3ebbd44b9553b0aabcfff7b68d674ddb6052cc

    • SHA512

      c7f2c95d6f02885403c88f549f14ee8fd8efde905f8b42362857b0c8c9f83e7b4bbe09f7933184f931049aba25d1112bac6fd488f95eebc94b75badc09cf3b8c

    Score
    10/10
    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks