General
-
Target
itechmotion.invoice.09.26.2022.doc
-
Size
866KB
-
Sample
220926-wfrx6scffp
-
MD5
10a5d966940ea1c905706be520951f93
-
SHA1
2193b386d1ec69067ab48ac97321fa32f1bba5f8
-
SHA256
213d3eb70ec15b26498f49724494a0d342d7af7fd491c375a0ae056b3689f77a
-
SHA512
e0646ca08bd99fbd195674acb30f89a7a05f74b47ba9367087d9f8fd9a90a26964c08bacbe91bf3c422c163c3af16b90d16bde70c537a5fa8f760958a5aa075a
-
SSDEEP
12288:XVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEvh6lHxuNzNVb:XV2jUeQRI5wPN/0IlE1NVb
Behavioral task
behavioral1
Sample
itechmotion.invoice.09.26.2022.docm
Resource
win7-20220812-en
Malware Config
Extracted
icedid
742081363
Extracted
icedid
742081363
scainznorka.com
Targets
-
-
Target
itechmotion.invoice.09.26.2022.doc
-
Size
866KB
-
MD5
10a5d966940ea1c905706be520951f93
-
SHA1
2193b386d1ec69067ab48ac97321fa32f1bba5f8
-
SHA256
213d3eb70ec15b26498f49724494a0d342d7af7fd491c375a0ae056b3689f77a
-
SHA512
e0646ca08bd99fbd195674acb30f89a7a05f74b47ba9367087d9f8fd9a90a26964c08bacbe91bf3c422c163c3af16b90d16bde70c537a5fa8f760958a5aa075a
-
SSDEEP
12288:XVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEvh6lHxuNzNVb:XV2jUeQRI5wPN/0IlE1NVb
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-