General
-
Target
butler-bremer-doc-08.11.doc
-
Size
2.3MB
-
Sample
220812-rtlwvsgeg4
-
MD5
dbfecdc774a16bcaa3e8f1bce58f3ba2
-
SHA1
9e67bac7c0db1f2f1db497beec832e1da67828ad
-
SHA256
9040e1fcc5a51eb597103870c98ca41f51a1bf8dd5e05eac180a4424e16ac82f
-
SHA512
b13f35bbdab07a29dae2944d5463ba38f01195022130c158a356031bd81863a5b15889d784457dadfcd703a423395709bed9fec392f3c74a32c4a4ce94706a32
Static task
static1
Behavioral task
behavioral1
Sample
butler-bremer-doc-08.11.docm
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
butler-bremer-doc-08.11.docm
Resource
win10v2004-20220721-en
Malware Config
Extracted
icedid
3570055661
Targets
-
-
Target
butler-bremer-doc-08.11.doc
-
Size
2.3MB
-
MD5
dbfecdc774a16bcaa3e8f1bce58f3ba2
-
SHA1
9e67bac7c0db1f2f1db497beec832e1da67828ad
-
SHA256
9040e1fcc5a51eb597103870c98ca41f51a1bf8dd5e05eac180a4424e16ac82f
-
SHA512
b13f35bbdab07a29dae2944d5463ba38f01195022130c158a356031bd81863a5b15889d784457dadfcd703a423395709bed9fec392f3c74a32c4a4ce94706a32
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-