General
-
Target
joejeterfile09.26.2022.doc
-
Size
866KB
-
Sample
220926-wj669scfgr
-
MD5
88007b0a9fe81f81d5cabb9d39a301db
-
SHA1
de1b4ca520bd7c8d98b879afe8ffe2efc2f88c19
-
SHA256
f0fe9a6eb424f7e7c63ff495b7576cfcf29676ae9dc5b8539808f5ffd763be5e
-
SHA512
147a5d37d418165be79a5b10d06cafebe8bbae0fe619b8f7ac9c1a093f8a08b848fd19e82d951fbd432f0eec8a977849a6fb18da52f8fcea1167009b9461a63f
-
SSDEEP
12288:rfHdVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEv0y2aRtxzFZjFc9:rfHdV2jUeQRI5wPN/H8ZHc9
Behavioral task
behavioral1
Sample
joejeterfile09.26.2022.docm
Resource
win7-20220812-en
Malware Config
Extracted
icedid
742081363
scainznorka.com
Targets
-
-
Target
joejeterfile09.26.2022.doc
-
Size
866KB
-
MD5
88007b0a9fe81f81d5cabb9d39a301db
-
SHA1
de1b4ca520bd7c8d98b879afe8ffe2efc2f88c19
-
SHA256
f0fe9a6eb424f7e7c63ff495b7576cfcf29676ae9dc5b8539808f5ffd763be5e
-
SHA512
147a5d37d418165be79a5b10d06cafebe8bbae0fe619b8f7ac9c1a093f8a08b848fd19e82d951fbd432f0eec8a977849a6fb18da52f8fcea1167009b9461a63f
-
SSDEEP
12288:rfHdVE9j2y+1JbeQbntrws6/GYzw6OFokpXfiiGef/DEv0y2aRtxzFZjFc9:rfHdV2jUeQRI5wPN/H8ZHc9
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-