General
-
Target
59ddf7fd2901ffddc12d730d41a59ef51a0cf834145bcf883d8c1106b6aad0c7.iso
-
Size
480KB
-
Sample
220627-xalpmscgeq
-
MD5
1effd4b7c5e5fa409daaa8330e0c4204
-
SHA1
62b8bd1075f61ba49c20d45bdb63f329c2aca173
-
SHA256
59ddf7fd2901ffddc12d730d41a59ef51a0cf834145bcf883d8c1106b6aad0c7
-
SHA512
9b1fe0fa6e0fc7a0704ddb6d06a42cdb488b94356d2fb08f1f2d0b780cecf555eae3ff46a974298ac11297ca49c6ed3311c86a5dd2bef7ab1796661db5ab1e9c
Static task
static1
Behavioral task
behavioral1
Sample
878.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
878.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
demand_letter.jpg.lnk
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
demand_letter.jpg.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
vGhhsvfLkp.ps1
Resource
win7-20220414-en
Malware Config
Extracted
icedid
3239568078
carbrownleger.com
Targets
-
-
Target
878.dll
-
Size
353KB
-
MD5
986e75b5f349d6066edd3c4b5428b21c
-
SHA1
909f7b67f329152299dd2c194e17bb71ad5ffa9e
-
SHA256
42435ec9bb4f504231565acd20f873fe7800cc1219e724e116e11a5bf5db1bb6
-
SHA512
3baa45314e2aa16b97fc5a377a23e9b6820b4b4c6bdd13a5006c5fc3e2f44c83acc774be29623f8f3457fe3562c3292386495f10183a9cc9d49e46a151120cd1
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request
-
-
-
Target
demand_letter.jpg.lnk
-
Size
1KB
-
MD5
d01dc2fbb602e1058ae56f07fe895513
-
SHA1
decf03519d25e17b858d398d299b082ecf7e1fd1
-
SHA256
1040fce86562017f6eea2e609d1e7a49e928d140ac0e3bb30fd290f2b29d117b
-
SHA512
da7e540394e342db69fefa0c84d55d20e96f4e1764bb32fd4f87bd332b22d6a8b8923453aad2ab1f478200797fbdc68b8eddb618a8e2bc8e813e9f6c1bf08365
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
vGhhsvfLkp.ps1
-
Size
61B
-
MD5
8436a7bea697c48edaf67b93f46d02b0
-
SHA1
6f61548db8a87df80e2ca4f37fd02d70edae3e16
-
SHA256
7431c53295cf5952fc32ad1da45022c644d54578ed0ae55c0837b8b25e005e19
-
SHA512
b22ff1716ee34789f7ca168c93e768d37c05d4ce37345799645ced25e5742b44c79741a05db73995028bb7be6219f03b9b5670bff569a6281ef5fb33b78d654c
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request
-