General
-
Target
file
-
Size
380KB
-
Sample
211124-2hecrahae4
-
MD5
06634df65d6057b040a9e57622a40840
-
SHA1
7ccc520c0817ba32c5aeb4fa4014c40edb3954a1
-
SHA256
575f021bea9fcfc56c949fa31a99c169e1d7fda97d323f31a47085542ecb8636
-
SHA512
c31aba38da64b332bd46d399cb997a7f54ce35fe10873c29e51c6f93e106f0af85fd17d031bc0c6e94b384232c242dbad53db1afb1ccf379861777a2572630d8
Static task
static1
Behavioral task
behavioral1
Sample
core.bat
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
core.bat
Resource
win10-en-20211104
Behavioral task
behavioral3
Sample
donate-x32.dat.dll
Resource
win7-en-20211014
Behavioral task
behavioral4
Sample
donate-x32.dat.dll
Resource
win10-en-20211104
Malware Config
Extracted
icedid
Extracted
icedid
1217670233
lakogrefop.rest
hangetilin.top
follytresh.co
roadswendy.top
-
auth_var
17
-
url_path
/posts/
Targets
-
-
Target
core.bat
-
Size
188B
-
MD5
c60fcda7f2ccfaa8586b34e15a9a891a
-
SHA1
cd1900e98d96d059c55e050b424819359e4d6b3d
-
SHA256
f5499decd56ff563a4a54d7bdf89b866fd1013faf0f13eb1b6489fa162a65b8f
-
SHA512
57a996066e3a1fff7a3da1a9890dcce6b04bcad00f3bc92bf14612866ba60c170335ae6d81ca75a24cc6ea8d692794aceec80b2794a67cb8b67c54436c4e08d7
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
-
-
Target
donate-x32.dat
-
Size
67KB
-
MD5
06c6f61d2c16cb465767692e5e7b332d
-
SHA1
713bacf4f6689471c5a41662120264c73a79446c
-
SHA256
83f97f8f87237deba89ef2b16218f28f22cf36f2674d2d4f2f2af4faffe4c8df
-
SHA512
7044ae7f8393c95529225f734d61c112aa1a0a1ab0d1d491478a2a1ea44fa24b13b120578f9da41ea4040f476b7207340196273b84679f2df71411e5351d9c97
Score10/10 -