General
-
Target
7e06cdff2b667d8748bc8822ef11173cd7a66c5a52d2d2fbaf78c92a94c5f69c
-
Size
1.2MB
-
Sample
220915-pnw4jaggdj
-
MD5
a2f269e07c4e4be9e7d295bd34331146
-
SHA1
573a2862f0b067f503bd53cda70add0a5f5930c3
-
SHA256
7e06cdff2b667d8748bc8822ef11173cd7a66c5a52d2d2fbaf78c92a94c5f69c
-
SHA512
c0e72213109984c07556341732a56f2b7e0925252112c60170c770f4151446995398a42bd36c112bd63a0ad0b1e635fc4d3ddd9d04838717f4c87c9d15bfd214
-
SSDEEP
24576:CItkpZd/G2Oo6wewLPhHI38vYbiMefcVKFCk0RbtJ8wVpaIeOmZKAIIy7nQlj:CCo6SLPhosvmSf+KCbcEsIyKAIznGj
Static task
static1
Behavioral task
behavioral1
Sample
7e06cdff2b667d8748bc8822ef11173cd7a66c5a52d2d2fbaf78c92a94c5f69c.docm
Resource
win7-20220812-en
Malware Config
Extracted
icedid
809191839
Extracted
icedid
809191839
allozelkot.com
Targets
-
-
Target
7e06cdff2b667d8748bc8822ef11173cd7a66c5a52d2d2fbaf78c92a94c5f69c
-
Size
1.2MB
-
MD5
a2f269e07c4e4be9e7d295bd34331146
-
SHA1
573a2862f0b067f503bd53cda70add0a5f5930c3
-
SHA256
7e06cdff2b667d8748bc8822ef11173cd7a66c5a52d2d2fbaf78c92a94c5f69c
-
SHA512
c0e72213109984c07556341732a56f2b7e0925252112c60170c770f4151446995398a42bd36c112bd63a0ad0b1e635fc4d3ddd9d04838717f4c87c9d15bfd214
-
SSDEEP
24576:CItkpZd/G2Oo6wewLPhHI38vYbiMefcVKFCk0RbtJ8wVpaIeOmZKAIIy7nQlj:CCo6SLPhosvmSf+KCbcEsIyKAIznGj
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-