General
-
Target
ncidata-document-09.26.doc
-
Size
866KB
-
Sample
220926-vwz32sbdg4
-
MD5
c50d50d58e3806e5ce9bb75965a78c95
-
SHA1
e26cae6402e732bb781cf06edd02829031255e09
-
SHA256
b7c2b49bc0c9fc9ce0668e24229d18f21b18b8bf7c78bc45ffb1293e833cc0ce
-
SHA512
2a9bee4b3db815f96b85ebbc5e9b7c030cdaf26cf6b185faaf44bfd50a274bde3b21de31b0f9620166bd18dda84c2a49bd5fc14b7494aa998f83be93ea58c974
-
SSDEEP
12288:5VE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DERpcAJWRprEDe:5V2jUeQRI5wPN/ycAc2e
Behavioral task
behavioral1
Sample
ncidata-document-09.26.docm
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ncidata-document-09.26.docm
Resource
win10v2004-20220901-en
Malware Config
Extracted
icedid
742081363
Targets
-
-
Target
ncidata-document-09.26.doc
-
Size
866KB
-
MD5
c50d50d58e3806e5ce9bb75965a78c95
-
SHA1
e26cae6402e732bb781cf06edd02829031255e09
-
SHA256
b7c2b49bc0c9fc9ce0668e24229d18f21b18b8bf7c78bc45ffb1293e833cc0ce
-
SHA512
2a9bee4b3db815f96b85ebbc5e9b7c030cdaf26cf6b185faaf44bfd50a274bde3b21de31b0f9620166bd18dda84c2a49bd5fc14b7494aa998f83be93ea58c974
-
SSDEEP
12288:5VE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DERpcAJWRprEDe:5V2jUeQRI5wPN/ycAc2e
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-