General
-
Target
mvsdocument09.26.2022.doc
-
Size
866KB
-
Sample
220926-v3pwnabea8
-
MD5
b48acfc1e413b37d29e7284e4dc059f4
-
SHA1
0518c18f78faf9e97be202a9c530f9725c389163
-
SHA256
807fb8634a8e1fea7d7927dd6b00a351e51b8533009d76184a930f41ebcbcf49
-
SHA512
caf3c65a764476b014c028713e4ed2b5642d762554592320c660d3a43a62535ba5806e3e61587b91b91d67123d59c233f48af0a4ae3a077d02d42ac19c9bb003
-
SSDEEP
12288:TJVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DESaYjfH9lvYz9Q6d6:tV2jUeQRI5wPN//a0fHAz9QX
Behavioral task
behavioral1
Sample
mvsdocument09.26.2022.docm
Resource
win7-20220812-en
Malware Config
Extracted
icedid
742081363
Extracted
icedid
742081363
scainznorka.com
Targets
-
-
Target
mvsdocument09.26.2022.doc
-
Size
866KB
-
MD5
b48acfc1e413b37d29e7284e4dc059f4
-
SHA1
0518c18f78faf9e97be202a9c530f9725c389163
-
SHA256
807fb8634a8e1fea7d7927dd6b00a351e51b8533009d76184a930f41ebcbcf49
-
SHA512
caf3c65a764476b014c028713e4ed2b5642d762554592320c660d3a43a62535ba5806e3e61587b91b91d67123d59c233f48af0a4ae3a077d02d42ac19c9bb003
-
SSDEEP
12288:TJVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DESaYjfH9lvYz9Q6d6:tV2jUeQRI5wPN//a0fHAz9QX
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-