General
-
Target
file
-
Size
382KB
-
Sample
211104-a7jvzsfef4
-
MD5
e5a29a87fc6de783ef79b30862000086
-
SHA1
68bd44e0229b1f17faffbd480427a160c0d922a3
-
SHA256
fe05f61e5fe4fb12ffa5e8ca0e172841f9b96e6e195acf5fef10ff204a1d59f5
-
SHA512
e8cb5c56e6fb73fe4692a84c0644f3aa1b0260bd4ac5adf528b8d35759df3a3e8d431f1d8f6390971d94f263b4d36469132453fb0f15d5b8d28a00a070b49a3c
Static task
static1
Behavioral task
behavioral1
Sample
core.bat
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
core.bat
Resource
win10-en-20211014
Behavioral task
behavioral3
Sample
pigeon64.dat.dll
Resource
win7-en-20210920
Behavioral task
behavioral4
Sample
pigeon64.dat.dll
Resource
win10-en-20210920
Malware Config
Extracted
icedid
Extracted
icedid
1217670233
nnelforwfin.top
lakogrefop.rest
hangetilin.top
follytresh.co
-
auth_var
12
-
url_path
/posts/
Targets
-
-
Target
core.bat
-
Size
184B
-
MD5
2b4f27b826aec08eb90ff784b25d048d
-
SHA1
b1444548b53ec112797cc7d03a1e227fe71315ca
-
SHA256
b976471778c3abead8001c5a7db7d39b461e88bbd5322a579d86c1ca725375fb
-
SHA512
d6316825b5372e445941b75b08b04aaee49bab12d752dba4691aac8093100d1632a1b07e6b7d6899c528e6777f0bcfcd977e02a7f8d559b29e205703f573d434
Score10/10-
Blocklisted process makes network request
-
-
-
Target
pigeon64.dat
-
Size
159KB
-
MD5
de317e8f5ed28affbf38306925aa59a8
-
SHA1
38f670fadedf06bf12243b74618c5e4461416a6f
-
SHA256
b16bfd48ebbe416330327d2462bb5084bf0e3dfadd237b10e0c4670ed52532ef
-
SHA512
c9b02fa7effaeba55d1f324da2557c210b04b031991b1909d85dde90fed162d3c3afa8325ec96cd52f306074def915bf7c99e361502fea920bb33f68f322abce
Score10/10 -