General

  • Target

    enjoin,12.15.2020.doc

  • Size

    95KB

  • Sample

    201215-y2ncn7yjje

  • MD5

    833181d6dc9faf97302fe055e4d70799

  • SHA1

    0ce9dabffe93625a44751507355b719806d81d2b

  • SHA256

    47220270d007200cdf76e9867245320ead29976e15ab5e164d9babe8ac04bea0

  • SHA512

    a4f30b2203751528b4c3577549235de15d81c39b31f58825ee5117220d6d3fd7e7478c6c33ff7a0e3cf5495b2fd0a1bff611dbf4f086849f9a1c4dc3cc610de2

Score
10/10

Malware Config

Targets

    • Target

      enjoin,12.15.2020.doc

    • Size

      95KB

    • MD5

      833181d6dc9faf97302fe055e4d70799

    • SHA1

      0ce9dabffe93625a44751507355b719806d81d2b

    • SHA256

      47220270d007200cdf76e9867245320ead29976e15ab5e164d9babe8ac04bea0

    • SHA512

      a4f30b2203751528b4c3577549235de15d81c39b31f58825ee5117220d6d3fd7e7478c6c33ff7a0e3cf5495b2fd0a1bff611dbf4f086849f9a1c4dc3cc610de2

    Score
    10/10
    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks