General

  • Target

    require 12.20.doc

  • Size

    94KB

  • Sample

    201215-sjczsqxxh2

  • MD5

    b3218a9b099653d0ebc1db27aa505fc5

  • SHA1

    74a58b762eb0dd09e0b0cd310a21e05406b1e731

  • SHA256

    999e7814917b82aa383ba96826af8ea3dca9d9e5fb67c04cc042b1ebf060e83f

  • SHA512

    af650b58058375418e8f8cf97617c341c119bdf440a76881fa3720303f9fd820b96987de0f48e654544a95aea0ac86a63fa4587d9e2f60e069e945a6757cc8da

Score
10/10

Malware Config

Targets

    • Target

      require 12.20.doc

    • Size

      94KB

    • MD5

      b3218a9b099653d0ebc1db27aa505fc5

    • SHA1

      74a58b762eb0dd09e0b0cd310a21e05406b1e731

    • SHA256

      999e7814917b82aa383ba96826af8ea3dca9d9e5fb67c04cc042b1ebf060e83f

    • SHA512

      af650b58058375418e8f8cf97617c341c119bdf440a76881fa3720303f9fd820b96987de0f48e654544a95aea0ac86a63fa4587d9e2f60e069e945a6757cc8da

    Score
    10/10
    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

4
T1082

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

Tasks