General
-
Target
laid.db.exe
-
Size
317KB
-
Sample
220923-f5e2xadcb7
-
MD5
cc7be5d1ea14ba7c0d36496ad158d08d
-
SHA1
76f0e8e55a7d8de5a7064e25ea5fea086adca025
-
SHA256
61d6a2ac59a1cfa2890f2ccd67d8ae292cad575dbe19e843a05beb6a968d17d3
-
SHA512
b4a416d46831a0cf4eb4bb10e86059f079691a846d58a5cc9221b067a3a357d0314da0ac91cd7fa0ded655c0216d5f182939d982515a988c4e1008f48ca176bb
-
SSDEEP
6144:qrA2m2kP7+sOjcroyI0xwlh8boidmQp1tRdnjU8bk:q82/kP7yj1kuvcU8Q
Static task
static1
Behavioral task
behavioral1
Sample
laid.db.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
laid.db.dll
Resource
win10v2004-20220901-en
Malware Config
Extracted
icedid
1023645195
trallfasterinf.com
Targets
-
-
Target
laid.db.exe
-
Size
317KB
-
MD5
cc7be5d1ea14ba7c0d36496ad158d08d
-
SHA1
76f0e8e55a7d8de5a7064e25ea5fea086adca025
-
SHA256
61d6a2ac59a1cfa2890f2ccd67d8ae292cad575dbe19e843a05beb6a968d17d3
-
SHA512
b4a416d46831a0cf4eb4bb10e86059f079691a846d58a5cc9221b067a3a357d0314da0ac91cd7fa0ded655c0216d5f182939d982515a988c4e1008f48ca176bb
-
SSDEEP
6144:qrA2m2kP7+sOjcroyI0xwlh8boidmQp1tRdnjU8bk:q82/kP7yj1kuvcU8Q
Score10/10-
Blocklisted process makes network request
-