General

  • Target

    request.zip

  • Size

    85KB

  • Sample

    201215-bkmb3vra7a

  • MD5

    641b7f2a5a392296cacafb378b680c69

  • SHA1

    2f7fff3b8528b6b7236a2bcc0f5c3adbc3ff741b

  • SHA256

    db03167af22d454ea10c5f363cc9cbf415220773d6f20ebe4ce090030bdd7884

  • SHA512

    16a9ab289579275709f74f072f384ee5eb17e8c412efea0f0148b1ee260c1e1fb8445f05afd668b53cbca629f23ee7d5e61348e700651fc48a7f097dfb781048

Score
10/10

Malware Config

Targets

    • Target

      adjure.12.20.doc

    • Size

      93KB

    • MD5

      64393a529ec46b65ba0a426267deb250

    • SHA1

      0a29dd4706522832f09799a074d9ffc0e7ea20cd

    • SHA256

      d0f7db664104591aeaf788ca365effb2f75476921bfabc6df97f4c718cbc5eec

    • SHA512

      31b1c8db3054cc28ebf98127ec87f6ec6eb1359c40e00dc5ad540bbd3bd64a7dd7b64aed04ef7d4fdb6b70289b918974c0fd5dd126030855931121250bd034be

    Score
    10/10
    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks