General
-
Target
Document_72.iso
-
Size
1.6MB
-
Sample
230120-skrw7aaf6v
-
MD5
fac2d8d0b6e85888bf1459787777e961
-
SHA1
c6decc09d534e3f8cac8c80cf56db09b5984f6af
-
SHA256
b0c301d7315c49132886f59a6215e6899df630cf0f0f447df30eb382d1ab078e
-
SHA512
083e89bc9fd4fcf48af69e4b11b8cb72e4aa0233e142078c477c08e46698b2a479b1bfb0d03566a83059790a1658dbed17630feecb74740b9fdc50e55a5603b8
-
SSDEEP
6144:UuS8iJgEjHlmbG3Gt20CZPbPBtqdacYQ2MmUZ:Uu8JgfG3rLQfm
Static task
static1
Behavioral task
behavioral1
Sample
Document_72.iso
Resource
win7-20221111-en
Malware Config
Extracted
icedid
886885680
umousteraton.com
Targets
-
-
Target
Document_72.iso
-
Size
1.6MB
-
MD5
fac2d8d0b6e85888bf1459787777e961
-
SHA1
c6decc09d534e3f8cac8c80cf56db09b5984f6af
-
SHA256
b0c301d7315c49132886f59a6215e6899df630cf0f0f447df30eb382d1ab078e
-
SHA512
083e89bc9fd4fcf48af69e4b11b8cb72e4aa0233e142078c477c08e46698b2a479b1bfb0d03566a83059790a1658dbed17630feecb74740b9fdc50e55a5603b8
-
SSDEEP
6144:UuS8iJgEjHlmbG3Gt20CZPbPBtqdacYQ2MmUZ:Uu8JgfG3rLQfm
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-