General
-
Target
2364vg755gh443.dll
-
Size
480KB
-
Sample
220531-j4earseebm
-
MD5
30735c0ab9596e2452c2793fb64d8a47
-
SHA1
86838f63bd299f1eead9ddff69797d4d613819f8
-
SHA256
9f273a362a97856a64074278ea72672782567ff743d140b839504a841db810c2
-
SHA512
4e64eb287df13e3502418b5a8aadffc810501969658aaa953b1bb4dc8fa302b64d52dbba7795055ba1986980e896fb22f4407c2c74e3b86327f10d7983d5a962
Static task
static1
Behavioral task
behavioral1
Sample
2364vg755gh443.dll
Resource
win7-20220414-en
Malware Config
Extracted
icedid
2581925242
uleoballs.com
Targets
-
-
Target
2364vg755gh443.dll
-
Size
480KB
-
MD5
30735c0ab9596e2452c2793fb64d8a47
-
SHA1
86838f63bd299f1eead9ddff69797d4d613819f8
-
SHA256
9f273a362a97856a64074278ea72672782567ff743d140b839504a841db810c2
-
SHA512
4e64eb287df13e3502418b5a8aadffc810501969658aaa953b1bb4dc8fa302b64d52dbba7795055ba1986980e896fb22f4407c2c74e3b86327f10d7983d5a962
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request
-