General
-
Target
3203.dll
-
Size
807KB
-
Sample
220615-3vx63aghb8
-
MD5
63b610a3a9006160e270f8e7ad0db03f
-
SHA1
d1dc6ab79aa4b5affcd13cc876bcc60bac9b45d4
-
SHA256
a746ab385c513d0f73076ed4f83ac9e4e286ca7a8e5d6a5a4f0062026039b265
-
SHA512
0f440abc39352c077bcdc899872ddea2c0069c173d028fda5e0b790f6a8b4aba2eca0fd557c5b6e1d2e645e90a3c883bc664308886ff6c2b371ea59e6b10cd28
Static task
static1
Malware Config
Extracted
Family
icedid
Campaign
260931076
C2
ilekvoyn.com
Targets
-
-
Target
3203.dll
-
Size
807KB
-
MD5
63b610a3a9006160e270f8e7ad0db03f
-
SHA1
d1dc6ab79aa4b5affcd13cc876bcc60bac9b45d4
-
SHA256
a746ab385c513d0f73076ed4f83ac9e4e286ca7a8e5d6a5a4f0062026039b265
-
SHA512
0f440abc39352c077bcdc899872ddea2c0069c173d028fda5e0b790f6a8b4aba2eca0fd557c5b6e1d2e645e90a3c883bc664308886ff6c2b371ea59e6b10cd28
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request
-