General
-
Target
file
-
Size
363KB
-
Sample
220325-tg7c5shgg9
-
MD5
1a42038614e6259313d2edcabc1a947f
-
SHA1
1c39d9699bce25f5bf5c747f622da2fa44d7ac0f
-
SHA256
d943b24bcd45e79f7c2377e4b67eb52d56f9b16f65af683c0c086eecfcaf43e1
-
SHA512
491e933cf4033f1917a6552c70ab5ff4ce433e44cdb5d9520ee1501d929e149745d6527de1a0fc6cac51aeedfa656b3de161db61f8cf67fbbb8b4e9474818fb9
Static task
static1
Behavioral task
behavioral1
Sample
core.bat
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
core.bat
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
paper_x32.dll
Resource
win7-20220310-en
Behavioral task
behavioral4
Sample
paper_x32.dll
Resource
win10v2004-en-20220113
Malware Config
Extracted
icedid
3415411565
antnosience.com
seaskysafe.com
otectagain.top
dilimoretast.com
-
auth_var
18
-
url_path
/news/
Targets
-
-
Target
core.bat
-
Size
186B
-
MD5
e14de7f5eba87fa6b9466f4214c4d614
-
SHA1
25ed97a19eefa2e5d33013ceb95e386e70ac98f0
-
SHA256
e0326bb3bf6b5c2be434b3945229be63bef06830c2ad604671b8d4dc53db0ccc
-
SHA512
d7d7c0a6150d644147f924c85de27748d8c93aebb41fc37b6ba8f3dd4ef675cd0273d54443e4e76ee4acf3e4f9eb4a622184718f11e49d72bb39c5a68a4f29bf
Score10/10-
Blocklisted process makes network request
-
-
-
Target
paper_x32.dat
-
Size
43KB
-
MD5
d3a9e33c7e606b711b1d658248d96d4a
-
SHA1
430273e227bb4445fbd92363dc97310ca3232b48
-
SHA256
85c49c0c2f9778edc03a6797ffa139b27538fd7060d6b80f2d00e23aa158e625
-
SHA512
e15c697ce13a8140fb41596def262d414f47453b0f01e96b8659caa5f024e8c81b5b2462230b992e081d368078ac33f3f37c0dae17bfd81b0a06c960494e0f3d
Score1/10 -