General
-
Target
4137.dll
-
Size
480KB
-
Sample
220531-v61gkafehk
-
MD5
93d831598f186a9da102aee5a4ed3282
-
SHA1
29331947d50beb1bc29731b9acd0ff28827f5a81
-
SHA256
b09360897305f1076d7e5cdda72c25fd92624a883aa7439156bc68f1646f3597
-
SHA512
8620285ac33c3da095a46eb53ded1612571f9691d907baa7710f325ccaa10026f3fe9cdf1dbd167fe92e56a6b712e988df63da9ae5231d6082d2a9c52a235962
Static task
static1
Malware Config
Extracted
Family
icedid
Campaign
2581925242
C2
uleoballs.com
Targets
-
-
Target
4137.dll
-
Size
480KB
-
MD5
93d831598f186a9da102aee5a4ed3282
-
SHA1
29331947d50beb1bc29731b9acd0ff28827f5a81
-
SHA256
b09360897305f1076d7e5cdda72c25fd92624a883aa7439156bc68f1646f3597
-
SHA512
8620285ac33c3da095a46eb53ded1612571f9691d907baa7710f325ccaa10026f3fe9cdf1dbd167fe92e56a6b712e988df63da9ae5231d6082d2a9c52a235962
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request
-