General
-
Target
sac3p.7z
-
Size
222KB
-
Sample
220630-xld4yaafc9
-
MD5
1dffe2464ff57e37a483c713f5823039
-
SHA1
02d35e456b553be3ba9906c395386a7ec0dacb97
-
SHA256
eac5d2ad5965e0c2da630487b93ba8922202720234df6ec941af3da66b4239cb
-
SHA512
9aa19fa0444cc713c04330953cd54c980c5999d95ce18d21c9b4c1d4af6eff9d72611643226606538bea2584f46a3c33248fc27c2e7107e54ea35e8876c82417
Static task
static1
Malware Config
Extracted
Family
icedid
Campaign
3635541348
C2
piponareatna.com
Targets
-
-
Target
sac3p.7z
-
Size
222KB
-
MD5
1dffe2464ff57e37a483c713f5823039
-
SHA1
02d35e456b553be3ba9906c395386a7ec0dacb97
-
SHA256
eac5d2ad5965e0c2da630487b93ba8922202720234df6ec941af3da66b4239cb
-
SHA512
9aa19fa0444cc713c04330953cd54c980c5999d95ce18d21c9b4c1d4af6eff9d72611643226606538bea2584f46a3c33248fc27c2e7107e54ea35e8876c82417
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request
-
Loads dropped DLL
-