General
-
Target
Invoice(165)#09-21-22.iso
-
Size
1.8MB
-
Sample
220921-rw846sgeb8
-
MD5
eb2f677b8017e7df9e48bc907e606ee2
-
SHA1
57077c5203f7b9c82e805ebc207514d73747fc8b
-
SHA256
d9207c37cdab01697d1431d0237d1fc7db1ef2f9db4731124b4f025cf5cc3420
-
SHA512
dc4a056e21ee1e7acbd6f03a4cc82d40524cd4ef1ef6688ce2b69f2cfa827a8e73523c473865b081091236a1e89994439ca1b80cc3e47c0b9bc1f12873d569c1
-
SSDEEP
6144:imXcJHP7csJqGGCfXJo0w4wNfL75I2iiXUw0JFY4npeGF:jOHP7tJp0762QlA
Static task
static1
Behavioral task
behavioral1
Sample
Invoice(165)#09-21-22.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Invoice(165)#09-21-22.iso
Resource
win10v2004-20220812-en
Malware Config
Extracted
icedid
1367965656
nikolandfantazy.com
Targets
-
-
Target
Invoice(165)#09-21-22.iso
-
Size
1.8MB
-
MD5
eb2f677b8017e7df9e48bc907e606ee2
-
SHA1
57077c5203f7b9c82e805ebc207514d73747fc8b
-
SHA256
d9207c37cdab01697d1431d0237d1fc7db1ef2f9db4731124b4f025cf5cc3420
-
SHA512
dc4a056e21ee1e7acbd6f03a4cc82d40524cd4ef1ef6688ce2b69f2cfa827a8e73523c473865b081091236a1e89994439ca1b80cc3e47c0b9bc1f12873d569c1
-
SSDEEP
6144:imXcJHP7csJqGGCfXJo0w4wNfL75I2iiXUw0JFY4npeGF:jOHP7tJp0762QlA
Score10/10-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-