General

  • Target

    statistics.12.20.doc

  • Size

    83KB

  • Sample

    201211-5mepdcgtve

  • MD5

    3132824fb649bb9358abffdc67542593

  • SHA1

    a1bd53255b81a3dc7d3be1a2ca87522cbd758431

  • SHA256

    785e7a1f4e7d48efff95dd5d5574d7326845e67ccf3dc9b4dd228d25246ba933

  • SHA512

    04a8970679c9dc7d9732278cbb1f722c52ac2576c3b949a44e76d57cdc46068466fa2f5e1498dfbe1474bc7d036120459a4096bb69615657e3df9b20f55dfd5f

Score
10/10

Malware Config

Targets

    • Target

      statistics.12.20.doc

    • Size

      83KB

    • MD5

      3132824fb649bb9358abffdc67542593

    • SHA1

      a1bd53255b81a3dc7d3be1a2ca87522cbd758431

    • SHA256

      785e7a1f4e7d48efff95dd5d5574d7326845e67ccf3dc9b4dd228d25246ba933

    • SHA512

      04a8970679c9dc7d9732278cbb1f722c52ac2576c3b949a44e76d57cdc46068466fa2f5e1498dfbe1474bc7d036120459a4096bb69615657e3df9b20f55dfd5f

    Score
    10/10
    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks