Resubmissions
24-05-2022 12:25
220524-pllvsaabg7 10General
-
Target
54267-876-8676.lnk
-
Size
2KB
-
Sample
220524-pllvsaabg7
-
MD5
9edabe11d846a6de5d337e737d24e85c
-
SHA1
26f63aac40c4e9f459a379eec94a258b604f582e
-
SHA256
4b582f38e3376346cb066e36ff8dfa32b268154bb2de13870702e8bbf366a023
-
SHA512
5e88d418cb26f4bfd7bf5d1b2dbf31a8f026bbf29c760919d2986c883de6067df75c5eb8ca790a2c4a7ef09b87a2c6ba1b62e57e76fc3b32af633317639c6f0e
Static task
static1
Behavioral task
behavioral1
Sample
54267-876-8676.lnk
Resource
win7-20220414-en
Malware Config
Extracted
https://modhub.com.br/upload.hta
Extracted
https://modhub.com.br/upload.hta
Extracted
icedid
109932505
ilekvoyn.com
Targets
-
-
Target
54267-876-8676.lnk
-
Size
2KB
-
MD5
9edabe11d846a6de5d337e737d24e85c
-
SHA1
26f63aac40c4e9f459a379eec94a258b604f582e
-
SHA256
4b582f38e3376346cb066e36ff8dfa32b268154bb2de13870702e8bbf366a023
-
SHA512
5e88d418cb26f4bfd7bf5d1b2dbf31a8f026bbf29c760919d2986c883de6067df75c5eb8ca790a2c4a7ef09b87a2c6ba1b62e57e76fc3b32af633317639c6f0e
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-