General
-
Target
legal paper 010.20.doc
-
Size
101KB
-
Sample
201020-yw9lnxxzcs
-
MD5
fa6dd33e6694d584f2a16e342addb2b4
-
SHA1
dfeea7c92ce47d096df414faee5d64f765411aac
-
SHA256
2c074e34cde05236cbb5cf4f7bdc00b3e92b7804f82eafc42d9866fcc6c65287
-
SHA512
7a820e6c78ef47893830b50589d736efa60b093a36cfcea2acac7bf6c1840b93a9bb4866d74136a44cdb7ea6b580cab4c836b00917a3fa540346dc40cd19fa2c
Static task
static1
Behavioral task
behavioral1
Sample
legal paper 010.20.doc
Resource
win7
Behavioral task
behavioral2
Sample
legal paper 010.20.doc
Resource
win10v200722
Malware Config
Extracted
icedid
1949629567
Targets
-
-
Target
legal paper 010.20.doc
-
Size
101KB
-
MD5
fa6dd33e6694d584f2a16e342addb2b4
-
SHA1
dfeea7c92ce47d096df414faee5d64f765411aac
-
SHA256
2c074e34cde05236cbb5cf4f7bdc00b3e92b7804f82eafc42d9866fcc6c65287
-
SHA512
7a820e6c78ef47893830b50589d736efa60b093a36cfcea2acac7bf6c1840b93a9bb4866d74136a44cdb7ea6b580cab4c836b00917a3fa540346dc40cd19fa2c
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Loads dropped DLL
-