General
-
Target
request.doc
-
Size
2.3MB
-
Sample
220812-rt1p1sgeg5
-
MD5
7c36ee4f6d8bbecf5270657d6740adef
-
SHA1
1a9579f6534e0e2ad840c66f6db09d53d898be2d
-
SHA256
c42cbaf9d2df31592ed81fa1f9e5df7a1741eea1b63c1d0396b0722ca7e5cd97
-
SHA512
d1146583f4b02ec6e8ebb4395873d4e2fb1520c5c3987ed79c43d446a11b2e56cb451b603c3a3081749045b316cd22c4e9a920221d6e46897bad82718bd44903
Static task
static1
Behavioral task
behavioral1
Sample
request.docm
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
request.docm
Resource
win10v2004-20220721-en
Malware Config
Extracted
icedid
3570055661
alexbionka.com
Targets
-
-
Target
request.doc
-
Size
2.3MB
-
MD5
7c36ee4f6d8bbecf5270657d6740adef
-
SHA1
1a9579f6534e0e2ad840c66f6db09d53d898be2d
-
SHA256
c42cbaf9d2df31592ed81fa1f9e5df7a1741eea1b63c1d0396b0722ca7e5cd97
-
SHA512
d1146583f4b02ec6e8ebb4395873d4e2fb1520c5c3987ed79c43d446a11b2e56cb451b603c3a3081749045b316cd22c4e9a920221d6e46897bad82718bd44903
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-