General
-
Target
00dd6aeb15e617e9c1fab4eecaa847c6.dll
-
Size
423KB
-
Sample
220704-xlbzksagdl
-
MD5
00dd6aeb15e617e9c1fab4eecaa847c6
-
SHA1
80f60e0cfbf2926555a87623a448e4d7763d1acd
-
SHA256
cb5a1e1bcfeb4beb9f4c6bbd47371c6e0463e51f687c29b22616f83abbe8042d
-
SHA512
8572404141e2d3e3d40b0de6e80e949cfaba6d931ddeb40673dd7224d64914167ceebc5af8981d2d2c9cae881fb32f2e1f28aeb664a2e8af4f777de59805d03d
Static task
static1
Behavioral task
behavioral1
Sample
00dd6aeb15e617e9c1fab4eecaa847c6.dll
Resource
win7-20220414-en
Malware Config
Extracted
icedid
3635541348
piponareatna.com
Targets
-
-
Target
00dd6aeb15e617e9c1fab4eecaa847c6.dll
-
Size
423KB
-
MD5
00dd6aeb15e617e9c1fab4eecaa847c6
-
SHA1
80f60e0cfbf2926555a87623a448e4d7763d1acd
-
SHA256
cb5a1e1bcfeb4beb9f4c6bbd47371c6e0463e51f687c29b22616f83abbe8042d
-
SHA512
8572404141e2d3e3d40b0de6e80e949cfaba6d931ddeb40673dd7224d64914167ceebc5af8981d2d2c9cae881fb32f2e1f28aeb664a2e8af4f777de59805d03d
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request
-