General
-
Target
Setup_Win_31-12-2022_01-50-16.zip
-
Size
458KB
-
Sample
221231-hm25tsce6z
-
MD5
1bb92c333fa5c1e2b18934f05fac6e51
-
SHA1
d4f21faaefd382c4089146c43eefb0f1458337d1
-
SHA256
e519b8b79c30ff05cba6b43dc9a6bb03f715c053bb0e8e50abed123cf4f7f9ef
-
SHA512
16b07138195cccbc50b5b524d51d6e9dba74ecc6c81e288ecd94367b6751b82b64bd815e2124df1fa5ee708d3bae78efb1f362fa6f153d7277afce716dd6eb93
-
SSDEEP
12288:Pluss5FqDiw24ZqUnZfahtdOmqL6Nu6jcwSZsmk4dhIfi8L:PUh50Diw2lustd0L6Nv9SZsZ4AfDL
Static task
static1
Behavioral task
behavioral1
Sample
Setup_Win_31-12-2022_01-50-16.msi
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Setup_Win_31-12-2022_01-50-16.msi
Resource
win10v2004-20221111-en
Malware Config
Extracted
icedid
2957048208
whothitheka.com
Targets
-
-
Target
Setup_Win_31-12-2022_01-50-16.msi
-
Size
772KB
-
MD5
4509edb7effdfc57e288bb7b23fa0180
-
SHA1
edd9910a9b2774e5a9a36ca096d299b092556016
-
SHA256
c0a063352598eae28f226207503d864a06f5490497b074a9390927793ea16bfd
-
SHA512
c6a321a42f6235e89b9c256ccdc2d697437baa07574c4da12e65a8c225a007f5da7a6e9b8e14d88a27de19d7b78b5375e3938c5be9054fa62f645fe2420afda0
-
SSDEEP
12288:TwHL0DpsMX/wg4ZqU0UmmhtNOOdpxoPcrDnS34y9RPF8L:0HL0tvwglMtNjjoGS3bRPF8L
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-