General
-
Target
89e052bd182df8de5960784c663f962d44e058c8920a437f54ab75d03a7da3bd.iso
-
Size
614KB
-
Sample
220224-z1aq6sehfl
-
MD5
6e78f987459df53ba44ac0a3b6cf147d
-
SHA1
fc3cb673c081c9bcb22b6407c376d66254dfa9fc
-
SHA256
89e052bd182df8de5960784c663f962d44e058c8920a437f54ab75d03a7da3bd
-
SHA512
4455b8a3fc38fcdaad2771b9018c2e0d4367f29cae23290355fcdb7d766dcc63c1c2c75e519cd0c634df05003e579fe3331ae8967461439f3e05ba1bc24dff72
Static task
static1
Behavioral task
behavioral1
Sample
Attachment.jpg.lnk
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Attachment.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
z.ps1
Resource
win7-20220223-en
Malware Config
Extracted
icedid
3976801418
blinkenx.com
Targets
-
-
Target
Attachment.jpg.lnk
-
Size
1KB
-
MD5
d1ff80bc7c989227fb15abde19228bad
-
SHA1
8388cb716f544a7395d4794860b71766eb500200
-
SHA256
0cf9c93c8d12ac79600311efc0c6a4dab7f34c18bd8321e03d7b0fcbba6d0279
-
SHA512
c4bf377b85f94d6746c32c50aeb2e2ce8f680d4514587857a5217ae64ab06cc16959e55cfd6c61dc9e7693ee18aa10ec0f90b94e3c449d00464f196229cfff66
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
IcedID First Stage Loader
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
z.ps1
-
Size
264KB
-
MD5
b9942f242fc7a5b191d369d62419427f
-
SHA1
465d2a92253adda3da9c6141e972bdbb3581fd60
-
SHA256
4bec4c4012eab37036844348e9d5df6e98e3f9dbd2be3a7b4dfd8ba78e8b5a2e
-
SHA512
40484368690f992f64ea7b874202b71af278c11f131c5b128b3f8b1b34f93c801d99666466046dd0abf92bfce206d616a6014decf344c499962bb79515cad6f2
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
IcedID First Stage Loader
-
Blocklisted process makes network request
-