General
-
Target
inquiry.05.17.21.doc
-
Size
65KB
-
Sample
210517-j2ekvjz9y6
-
MD5
e0452e225acb088de11d6517db7479ac
-
SHA1
298ea7b0e1035975e024876665aa13f2a15ea8f7
-
SHA256
7215e503b77bdd7fd48b5f63cbce288bf0caa00ed5688bc9b810cb51ed3a765a
-
SHA512
376a1bb04cfc540f2e7ddc3c7a9d69dce0126dd94b6a13c073c556c82a9eb9857437bb3aa90e2964bf89e8036cca7a32d193bdc67f44218560825c6770ea85f8
Static task
static1
Behavioral task
behavioral1
Sample
inquiry.05.17.21.doc
Resource
win7v20210410
Malware Config
Extracted
icedid
632457322
kickersflyers.bid
Targets
-
-
Target
inquiry.05.17.21.doc
-
Size
65KB
-
MD5
e0452e225acb088de11d6517db7479ac
-
SHA1
298ea7b0e1035975e024876665aa13f2a15ea8f7
-
SHA256
7215e503b77bdd7fd48b5f63cbce288bf0caa00ed5688bc9b810cb51ed3a765a
-
SHA512
376a1bb04cfc540f2e7ddc3c7a9d69dce0126dd94b6a13c073c556c82a9eb9857437bb3aa90e2964bf89e8036cca7a32d193bdc67f44218560825c6770ea85f8
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-