General
-
Target
_tmp_Unpaid_8217_Dec9.html
-
Size
311KB
-
Sample
221210-r1j1vaad2x
-
MD5
04903994f360964bb648ca3af92ed95d
-
SHA1
d3719a0544f04f1bb15c98207b81763d69808f57
-
SHA256
b95cd7e4e787f3759442eeba86ca13d764392ebbd24902378067b553e9f63f7a
-
SHA512
3b331f25c01570d2349fb174817d03d6477376b58232e185c1c509e8815d7465537e547133e3793a5ad8b250379b4b309e359f306b0050ee42eb736b9a70c926
-
SSDEEP
6144:8ZoPBQWo8qlxRn6h34rOi6oBO9qylT3UaBKB8i+BtSem3N/DkSf3Yx1VJSxt+ooi:HpZobLn6hiOi6+OvJF8+BtoAK3Yx3JS/
Static task
static1
Behavioral task
behavioral1
Sample
_tmp_Unpaid_8217_Dec9.html
Resource
win10v2004-20220812-de
Malware Config
Extracted
icedid
1268412609
ewgahskoot.com
Targets
-
-
Target
_tmp_Unpaid_8217_Dec9.html
-
Size
311KB
-
MD5
04903994f360964bb648ca3af92ed95d
-
SHA1
d3719a0544f04f1bb15c98207b81763d69808f57
-
SHA256
b95cd7e4e787f3759442eeba86ca13d764392ebbd24902378067b553e9f63f7a
-
SHA512
3b331f25c01570d2349fb174817d03d6477376b58232e185c1c509e8815d7465537e547133e3793a5ad8b250379b4b309e359f306b0050ee42eb736b9a70c926
-
SSDEEP
6144:8ZoPBQWo8qlxRn6h34rOi6oBO9qylT3UaBKB8i+BtSem3N/DkSf3Yx1VJSxt+ooi:HpZobLn6hiOi6+OvJF8+BtoAK3Yx3JS/
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-