General
-
Target
Setup_Win_29-12-2022_17-21-18.msi
-
Size
772KB
-
Sample
221229-x6fhhahb8t
-
MD5
37d819630a3536847fd4617c661695e2
-
SHA1
134da7d0bbda94b054cb20cd9f6e759cd010c166
-
SHA256
38a68c48a2cb002af6c7bd36412ce920202e04c5ef73d7ea58a1303122142891
-
SHA512
47b5aed5ae382b56d3197c3ca53a5bfe55fc9f9c4be3b5503daac2223261373ae1e791e7dc3823365460f2df16a9ee72bfa358a21ebb46bf5597f72949da2165
-
SSDEEP
12288:ewHL0DpxMX/wg4ZqU0UmmhtNOOdpxoPcrDnS34y9RPF8L:XHL0EvwglMtNjjoGS3bRPF8L
Static task
static1
Behavioral task
behavioral1
Sample
Setup_Win_29-12-2022_17-21-18.msi
Resource
win10-20220812-en
Malware Config
Extracted
icedid
2957048208
whothitheka.com
Targets
-
-
Target
Setup_Win_29-12-2022_17-21-18.msi
-
Size
772KB
-
MD5
37d819630a3536847fd4617c661695e2
-
SHA1
134da7d0bbda94b054cb20cd9f6e759cd010c166
-
SHA256
38a68c48a2cb002af6c7bd36412ce920202e04c5ef73d7ea58a1303122142891
-
SHA512
47b5aed5ae382b56d3197c3ca53a5bfe55fc9f9c4be3b5503daac2223261373ae1e791e7dc3823365460f2df16a9ee72bfa358a21ebb46bf5597f72949da2165
-
SSDEEP
12288:ewHL0DpxMX/wg4ZqU0UmmhtNOOdpxoPcrDnS34y9RPF8L:XHL0EvwglMtNjjoGS3bRPF8L
Score10/10-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-