General
-
Target
deed contract 12.15.2021.doc
-
Size
42KB
-
Sample
211215-qrtm9ahef3
-
MD5
5743e3edb2bf64fe08e5e9a6ea24cd7e
-
SHA1
4bd0151fa9520c9886f7d7a250596687b52bfa81
-
SHA256
f604ca55de802f334064610d65e23890ab81906cdac3f8a5c7c25126176289c8
-
SHA512
8728257bd9a6d3fc252b3fa56ece7b6b81f7ac9608327cf7984600ffb277ac3ba9ebe0bc10bca5b2267a9cf1e9025aea95309efcfb05db6e3f381454ff1296a7
Static task
static1
Behavioral task
behavioral1
Sample
deed contract 12.15.2021.doc
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
deed contract 12.15.2021.doc
Resource
win10-en-20211208
Malware Config
Extracted
icedid
1694525507
firenicatrible.com
Targets
-
-
Target
deed contract 12.15.2021.doc
-
Size
42KB
-
MD5
5743e3edb2bf64fe08e5e9a6ea24cd7e
-
SHA1
4bd0151fa9520c9886f7d7a250596687b52bfa81
-
SHA256
f604ca55de802f334064610d65e23890ab81906cdac3f8a5c7c25126176289c8
-
SHA512
8728257bd9a6d3fc252b3fa56ece7b6b81f7ac9608327cf7984600ffb277ac3ba9ebe0bc10bca5b2267a9cf1e9025aea95309efcfb05db6e3f381454ff1296a7
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-