General
-
Target
iwdocument12.23.2022.docm
-
Size
1.3MB
-
Sample
221224-wlxevade7w
-
MD5
655402ee5fbd4bdd9a6e08703bb3452e
-
SHA1
8bbd519f46ebcdb6fbb3912fec5e36a03ce205bb
-
SHA256
bd0512e03c8d40051d895de308e6e30c045470b54d47f1f71caea2675f01c468
-
SHA512
36456bd7d7b1231a0c68f7ff285a0044a8fedf26170ad36e95b21f743adc4f04226fb6f0b3defd15cc1aa7bf1fa7ea6c47c35791eddd5bfe0b7957c7b2720a25
-
SSDEEP
24576:/gpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRDSG7EzqHm+Bmc7:/gpJmgf3zliFppBKqG+b
Behavioral task
behavioral1
Sample
iwdocument12.23.2022.docm
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
iwdocument12.23.2022.docm
Resource
win10v2004-20220812-en
Malware Config
Extracted
icedid
1212497363
Extracted
icedid
1212497363
trbiriumpa.com
Targets
-
-
Target
iwdocument12.23.2022.docm
-
Size
1.3MB
-
MD5
655402ee5fbd4bdd9a6e08703bb3452e
-
SHA1
8bbd519f46ebcdb6fbb3912fec5e36a03ce205bb
-
SHA256
bd0512e03c8d40051d895de308e6e30c045470b54d47f1f71caea2675f01c468
-
SHA512
36456bd7d7b1231a0c68f7ff285a0044a8fedf26170ad36e95b21f743adc4f04226fb6f0b3defd15cc1aa7bf1fa7ea6c47c35791eddd5bfe0b7957c7b2720a25
-
SSDEEP
24576:/gpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRDSG7EzqHm+Bmc7:/gpJmgf3zliFppBKqG+b
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-