General
-
Target
file
-
Size
680KB
-
Sample
220217-szdm4sbdg3
-
MD5
96617ff25f134f882a34da9ceae7f68d
-
SHA1
2d4df158d1d740209d6620ef409fc737c725a908
-
SHA256
8b435260be4ed4a5286c36ac8b5296d9b3b637ced5a1ad3e2704ea2fff5b20ed
-
SHA512
8f0fc40355742c0b54a8069f708843e841c984bc03f1217d29be55a5333dfeffef7bb6af62575fe8a430a1403806e02e199e8d3dab41eac533aa925595c11bbd
Static task
static1
Behavioral task
behavioral1
Sample
core.bat
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
core.bat
Resource
win10v2004-en-20220112
Behavioral task
behavioral3
Sample
oak_32.dll
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
oak_32.dll
Resource
win10v2004-en-20220112
Malware Config
Extracted
icedid
Extracted
icedid
3036889562
stooryallice.com
yellowpyrrol.com
-
auth_var
1
-
url_path
/news/
Targets
-
-
Target
core.bat
-
Size
180B
-
MD5
5abd34de9a35879df648b0fceb40e95d
-
SHA1
b57efae330d206a933d0e92699536056ee84d7df
-
SHA256
e3b8505a1fc778f8cb1679695e0aba51ea3feafb04901822df1bab5685178876
-
SHA512
72db89236aae1fd29c17b6a8916eb9c4855f5ed33daa01268a4613e73b0361f51975531f46c55e93ebd0ac65d0bcd3ba1b336b920ce7573824b116533cd0e00a
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
-
-
Target
oak_32.tmp
-
Size
533KB
-
MD5
3a154ce57e032a255a9936b92aaf996f
-
SHA1
512e5af1b4b98c7d5a7c8d25341f31749f331273
-
SHA256
c558309a80b460844bc23a72c49d524d299c11fc058b2b5ea150790022144ac6
-
SHA512
e0226761df28bba51b86a9d8aac3359eba922c86b42ed3db5541fffa05e607932b39579b7fd11202ffa1ef750f9695bb696f76e9275c4a483fb049c33aa6ca5f
Score10/10 -