General
-
Target
Request-09-27-document-235.iso
-
Size
1.9MB
-
Sample
220929-vm4pwabed5
-
MD5
c7f65fb3d817ac077f6c75c852caeb05
-
SHA1
3632792b1e1643402fc88e76ed2c1734cc2b4d86
-
SHA256
a4843e1bfd7169fd3ff3207a39603ad4308dedb39dbf25a168cab916515f5104
-
SHA512
d700144a63d491ddf33d5419e2b1a321abc34264de80d3e5f0e5982fe25d39637bf4f2f63d463b30dedb2128550de5b525f1753113ea5d9498bd36f36378523b
-
SSDEEP
6144:JEF/cCDQ2eyT3Zw+p0Yyvq1i6qz/QeQqHDT4xE:IcmQ2es3Zw+pRcq1i6qhjS
Static task
static1
Malware Config
Extracted
icedid
973312338
tezycronam.com
Targets
-
-
Target
Request-09-27-document-235.iso
-
Size
1.9MB
-
MD5
c7f65fb3d817ac077f6c75c852caeb05
-
SHA1
3632792b1e1643402fc88e76ed2c1734cc2b4d86
-
SHA256
a4843e1bfd7169fd3ff3207a39603ad4308dedb39dbf25a168cab916515f5104
-
SHA512
d700144a63d491ddf33d5419e2b1a321abc34264de80d3e5f0e5982fe25d39637bf4f2f63d463b30dedb2128550de5b525f1753113ea5d9498bd36f36378523b
-
SSDEEP
6144:JEF/cCDQ2eyT3Zw+p0Yyvq1i6qz/QeQqHDT4xE:IcmQ2es3Zw+pRcq1i6qhjS
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-