General
-
Target
sol3nia.zip
-
Size
200KB
-
Sample
220624-zvqkfahdc4
-
MD5
e87a05b109d51201681aef116688158d
-
SHA1
07d7f7002ce471aa6b30e5023c264fb92c6c96fd
-
SHA256
3817720772f336e0a1b850512fcad23d31ccb3099eb46af82bf98328895af665
-
SHA512
b0139dfe0c9ee7297c879a512415907e1e7afb1056af46ab2e088884824fe5a70150da91b37a68c050dafd3da0f6b4b7409eecb0b75160fada27491bc8b9c7ec
Static task
static1
Behavioral task
behavioral1
Sample
sol3nia/documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sol3nia/documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
sol3nia/sol3nia.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
sol3nia/sol3nia.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
icedid
3585208491
bredofenction.com
Targets
-
-
Target
sol3nia/documents.lnk
-
Size
2KB
-
MD5
a70b3ec4c53ae4755365ac54d9ee05ec
-
SHA1
2d991fc5b373182b537300b93329eaee13d2294e
-
SHA256
2fe44042cfc6602b43204e38bcbc2773d1e4f87be6aa16073625bc1b33af6877
-
SHA512
57de536a0b7c3ab74aa7480195341a3214162790869cfaede1917558fffb48023206eb68fb0a29d46c2eb720357f70bfe43a4d6a379f19a16f1ab34e28178050
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
sol3nia/sol3nia.dll
-
Size
355KB
-
MD5
88789ba7f00909005b2fe18ce83dbf58
-
SHA1
08ffb813d1d7544380aa1b0e41703207451e1def
-
SHA256
00dcc4642d488643856259cd3c576d9e24045b48783fc21ebdccd5fb4de66f8c
-
SHA512
c78f79bd27a535e2efc1a133bfe92048dc3a77e9b9e6ef0aebab6403835fb585771c4da14493a1bf81a72e0f8340a5db81964e8852b4a3e8d0f9232985cd3478
Score3/10 -