General
-
Target
Document_45_Dec1.html
-
Size
221KB
-
Sample
221215-e5gp3aef6w
-
MD5
6c130bf0bf8c70d5fd04418d005aabf1
-
SHA1
9e5d2b15c11fd7d01de0cf5820c1d701b58a4704
-
SHA256
a2948b43f53a5cb46d59e85563528d4b33015170453ad1648b0578a9ce5b913e
-
SHA512
0135e266ce4a3bafd30f99bc0117a51d538e4b92c4f5624b2eef4e7fb55148232ee0ff3a2b56fbe2d2cd582713344da03c615d58f567faa710d1a9ca33ba3bb4
-
SSDEEP
6144:V1oT3/qcQLScAEsZieCSt4Sem3N/DkSf3Yx1VJSxt+ooYu7k:VwPjQWcRsB4oAK3Yx3JSxcYb
Static task
static1
Behavioral task
behavioral1
Sample
Document_45_Dec1.html
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Document_45_Dec1.html
Resource
win10v2004-20221111-en
Malware Config
Extracted
icedid
2271535685
babysoftletirs.com
Targets
-
-
Target
Document_45_Dec1.html
-
Size
221KB
-
MD5
6c130bf0bf8c70d5fd04418d005aabf1
-
SHA1
9e5d2b15c11fd7d01de0cf5820c1d701b58a4704
-
SHA256
a2948b43f53a5cb46d59e85563528d4b33015170453ad1648b0578a9ce5b913e
-
SHA512
0135e266ce4a3bafd30f99bc0117a51d538e4b92c4f5624b2eef4e7fb55148232ee0ff3a2b56fbe2d2cd582713344da03c615d58f567faa710d1a9ca33ba3bb4
-
SSDEEP
6144:V1oT3/qcQLScAEsZieCSt4Sem3N/DkSf3Yx1VJSxt+ooYu7k:VwPjQWcRsB4oAK3Yx3JSxcYb
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-