General
-
Target
Invoice-09-28#52_PDF.iso
-
Size
2.1MB
-
Sample
221004-zdtwjacfhp
-
MD5
c252583500fd18ee46365a3cd53a44bf
-
SHA1
6ba4c94b80ad0ef4703dabf1d20d1208c5921379
-
SHA256
0fdaa635a9eaac9b44ef6ba78dc4887f87e87678ced73093139b75f0200714ee
-
SHA512
cff5e0748ed5c1f027137cdb17c439c72e7e807ea15e8e89e032817727d0bc12866bf13d674a782e7637a5f2f39ea34960e77d25c9c1783c770d6d2a77943cb1
-
SSDEEP
6144:8JyOH6HGSOHyxj84LoOjlMsfEfv8LBUNObzJHdQIa98HrKg8x/IXz:8JOGSgyoOhMX8hQQ
Static task
static1
Behavioral task
behavioral1
Sample
Invoice-09-28#52_PDF.iso
Resource
win10v2004-20220812-en
Malware Config
Extracted
icedid
2220668032
alockajilly.com
Targets
-
-
Target
Invoice-09-28#52_PDF.iso
-
Size
2.1MB
-
MD5
c252583500fd18ee46365a3cd53a44bf
-
SHA1
6ba4c94b80ad0ef4703dabf1d20d1208c5921379
-
SHA256
0fdaa635a9eaac9b44ef6ba78dc4887f87e87678ced73093139b75f0200714ee
-
SHA512
cff5e0748ed5c1f027137cdb17c439c72e7e807ea15e8e89e032817727d0bc12866bf13d674a782e7637a5f2f39ea34960e77d25c9c1783c770d6d2a77943cb1
-
SSDEEP
6144:8JyOH6HGSOHyxj84LoOjlMsfEfv8LBUNObzJHdQIa98HrKg8x/IXz:8JOGSgyoOhMX8hQQ
Score10/10-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-