General
-
Target
https://firebasestorage.googleapis.com/v0/b/uplifted-theory-371719.appspot.com/o/NP6oE008nu%2Frequest_01-10_INV-260.zip?alt=media&token=8094aa26-471d-4968-85bf-ab0ba94484c4
-
Sample
230112-ddq9rafa35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://firebasestorage.googleapis.com/v0/b/uplifted-theory-371719.appspot.com/o/NP6oE008nu%2Frequest_01-10_INV-260.zip?alt=media&token=8094aa26-471d-4968-85bf-ab0ba94484c4
Resource
win10-20220812-en
Malware Config
Extracted
icedid
1421378695
ebothlips.com
Targets
-
-
Target
https://firebasestorage.googleapis.com/v0/b/uplifted-theory-371719.appspot.com/o/NP6oE008nu%2Frequest_01-10_INV-260.zip?alt=media&token=8094aa26-471d-4968-85bf-ab0ba94484c4
Score10/10-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-