General
-
Target
document-15779.iso
-
Size
706KB
-
Sample
221031-y1akqscfe8
-
MD5
f6c9cd7fb2b949437c1d69b4e6c2172f
-
SHA1
fd4961839db221278ad2bac08cb8509ef9f778b6
-
SHA256
7e59d0ce832dbcd35daafbc0bcd008729d1bec71cb547c607e2e02c85afaa25e
-
SHA512
740cb7fdab912a674ff0005b3fcb50e8e0fdeeade1b6e5b9cb4855b5b22fda5f0400c6e7cbcea3038552f6b3e1e439fcd09f0f0225b705060317cb7690a2d29c
-
SSDEEP
6144:lLRROwRRxwRRhtRRV2RRN8RRNqZSo5hUybNmbA4k7pIp6vLMoimii4SluOpOPUpa:vbcbA4k7pvLCmii4SlugrprM+t1p6yQ
Static task
static1
Behavioral task
behavioral1
Sample
document-15779.iso
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
document-15779.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
boites.cmd
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
boites.cmd
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
documents-8261.lnk
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
documents-8261.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
templates053.dll
Resource
win7-20220812-en
Malware Config
Extracted
icedid
89792758
trentonkaizerfak.com
Targets
-
-
Target
document-15779.iso
-
Size
706KB
-
MD5
f6c9cd7fb2b949437c1d69b4e6c2172f
-
SHA1
fd4961839db221278ad2bac08cb8509ef9f778b6
-
SHA256
7e59d0ce832dbcd35daafbc0bcd008729d1bec71cb547c607e2e02c85afaa25e
-
SHA512
740cb7fdab912a674ff0005b3fcb50e8e0fdeeade1b6e5b9cb4855b5b22fda5f0400c6e7cbcea3038552f6b3e1e439fcd09f0f0225b705060317cb7690a2d29c
-
SSDEEP
6144:lLRROwRRxwRRhtRRV2RRN8RRNqZSo5hUybNmbA4k7pIp6vLMoimii4SluOpOPUpa:vbcbA4k7pvLCmii4SlugrprM+t1p6yQ
Score3/10 -
-
-
Target
boites.cmd
-
Size
714B
-
MD5
96f6953006a02468f5d497727bd12c01
-
SHA1
982c900046efbb7f56ead5308121b6a1064259c2
-
SHA256
11f97889c6413cf1cc466664aa52c848326f6faf6f916e7ef5b5cb738c61ad8c
-
SHA512
c202c49bacee0a329f4c99fca1cc642a56f78bf1d800ab18f356f96480081e0f1318742fadb461549f15f9251882838448bf13b1035b75b6b937c9b3a89bd957
Score8/10-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
documents-8261.lnk
-
Size
2KB
-
MD5
13092a11f51da24b418d760fe05f6d36
-
SHA1
dad193253f28aed9f4df143554eeee8c5b0dbe99
-
SHA256
5fe42478e84564963c22b4a1cb6cc2b8ac563f485121dcde1ee87899d8af179f
-
SHA512
da587a4c4d5d19ee9f5891f47ac025b4f960b8b700763c50cafbdd49db4a7218ff8ea5baacd92f1df0d45b90e822e56c80f331af432c271e30a778550429de1c
Score8/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
-
-
Target
templates053.png
-
Size
202KB
-
MD5
42eb124bee0ea9908f7d6fa7d546a217
-
SHA1
001508914c56f982d4364efb53ee76397ccc1cbb
-
SHA256
f22b77e4bf567ca368392347a3db20b308dad81463fdf3c8fd09dd0e21488c0c
-
SHA512
ee25b838376b3c16253c5ebeba1881dd48ecb8b3453c055b4ee1bb193d8dbe43d57770c7cc9c0cfd9c2b8735648f6f2af8cc111c47118adf0dd27f2dd110f6fd
-
SSDEEP
3072:SluOppcEzDzRdOQQrusCpmkM+WzfK1EDuBMFU5OdNAfNsyQa:SluOpOPUprM+WLK1E6yldqOyQ
-
Blocklisted process makes network request
-