General
-
Target
99c1060f61d53bab5328cf79116d02352979e93348957455af21f2182a952631
-
Size
364KB
-
Sample
241221-vz4weavkbp
-
MD5
187a7c0895e92536fb49272c9222e322
-
SHA1
bab4c30f88ad53ad8947292151c059cc78947ccb
-
SHA256
99c1060f61d53bab5328cf79116d02352979e93348957455af21f2182a952631
-
SHA512
08accd06d5041c0f12af62d7652f8272fc8874ff3e48f5073e9ec45ad7a3692797ce83d0ca802da137bdfe385917c33c3330444c34af16965eec65c2f546175b
-
SSDEEP
6144:eWVqGqr8w0JzpapmeprYgSlG+wGrZ8VU2reGodTp+/rZRUk4tFXbVBoPvRgLP9LS:pVqGqCzpEm6tnGrOVUR8itFbVmxIljXK
Static task
static1
Behavioral task
behavioral1
Sample
core/cmd.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
core/cmd.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
core/future_64.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
core/future_64.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
icedid
1892568649
baeswea.com
bersaww.com
biglaneat.com
northspaceline.co
-
auth_var
11
-
url_path
/news/
Extracted
icedid
Targets
-
-
Target
core/cmd.bat
-
Size
192B
-
MD5
d83b7c6acb3c5f829f37216f5df0ac80
-
SHA1
17df2dab6a14e6d8e74c64f0afe318d8d6b6dda1
-
SHA256
0c4de9d5c061edbf453497374e031f533d5dd012e5d655ea8ad8bc914c1caa02
-
SHA512
e33f7bd757ef84d8c317eec90e6657decc0dafee9006231b86bfdecbeb3dc5f4c0b717cd2290e13e0d9d0e96a3f51917d50b30a0a10add8f663f08efd99ab31a
-
Icedid family
-
Blocklisted process makes network request
-
-
-
Target
core/future_64.dat
-
Size
113KB
-
MD5
e7317be4cdc343ccb724bede45bfee1b
-
SHA1
1cc27c2b4321c8c92f8be36dcdcbfec6d46e6ea2
-
SHA256
32a660a70c9e0893d820dc8d9bc89b4e419d45e7874127de58443aa22a423631
-
SHA512
ea486b98a75e4b6e565a80333612a02e822d916d0c1be03559253299c4e162215da4e17f2fb84ff5f124bf9e1a469da828e2465b69553c66c0b7f2c358faca2f
-
SSDEEP
1536:n/lGl9mBCBLFQ9MzJSEOh+hHagKOX3xIdCbfanzUNFuXQ3AwnsWIxew012UnQUkq:/wlABCBC9M4EpbZHCMkEkB
Score10/10-
Icedid family
-