General
-
Target
SW-1186978918.xlsb
-
Size
155KB
-
Sample
220210-ldl9ssgfh3
-
MD5
0d17b19ea324d2ae08a0473e98498bfc
-
SHA1
2f11fa59b4d2c64863881e8084c15c89da09c190
-
SHA256
1b6fc736726745e4d745f373d11ab661bd27db662a6e833b21678c193c06a88c
-
SHA512
d58be72762e83d358330cf8bc7801665e37909f5c7f94fbf0eb6133096c831cdf543598f7ea15f98bfd877966967f0939b8a99b555f8591eeae312452f9affe4
Behavioral task
behavioral1
Sample
SW-1186978918.xlsb
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
SW-1186978918.xlsb
Resource
win10v2004-en-20220112
Malware Config
Extracted
http://peragumer.com/vdj39dyg3ref/1.dll
http://peragumer.com/vdj39dyg3ref/2.dll
http://peragumer.com/vdj39dyg3ref/3.dll
Extracted
icedid
3825802847
Targets
-
-
Target
SW-1186978918.xlsb
-
Size
155KB
-
MD5
0d17b19ea324d2ae08a0473e98498bfc
-
SHA1
2f11fa59b4d2c64863881e8084c15c89da09c190
-
SHA256
1b6fc736726745e4d745f373d11ab661bd27db662a6e833b21678c193c06a88c
-
SHA512
d58be72762e83d358330cf8bc7801665e37909f5c7f94fbf0eb6133096c831cdf543598f7ea15f98bfd877966967f0939b8a99b555f8591eeae312452f9affe4
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Loads dropped DLL
-