General
-
Target
8sLDJbfC.4Ct112
-
Size
534KB
-
Sample
220707-v1d2dacgam
-
MD5
c4a9b4f3254be77448f72272765757c7
-
SHA1
40d1d12fe46a0b144f7f4bbb9fcb2a758c141e20
-
SHA256
36bd0d4b2148e6e63469a8f4d5e627224999b1cd65bd0bb760246da35f89147b
-
SHA512
645a7e75b5075febb232fd2b66a128ed0bfcdb710e8340553babd9a86d768404695ab1a0424d29e99d798cdb073626daf0a544558766d809aba70d8381218fc4
Static task
static1
Behavioral task
behavioral1
Sample
8sLDJbfC.dll
Resource
win7-20220414-en
Malware Config
Extracted
icedid
227378761
blionarywesta.com
Targets
-
-
Target
8sLDJbfC.4Ct112
-
Size
534KB
-
MD5
c4a9b4f3254be77448f72272765757c7
-
SHA1
40d1d12fe46a0b144f7f4bbb9fcb2a758c141e20
-
SHA256
36bd0d4b2148e6e63469a8f4d5e627224999b1cd65bd0bb760246da35f89147b
-
SHA512
645a7e75b5075febb232fd2b66a128ed0bfcdb710e8340553babd9a86d768404695ab1a0424d29e99d798cdb073626daf0a544558766d809aba70d8381218fc4
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request
-