General
-
Target
suddenlinkfile08.11.2022.doc
-
Size
2.3MB
-
Sample
220811-s4rqjabcg9
-
MD5
3b6a5f7e4f048cb005496243fe2a019e
-
SHA1
a2f68a276e0b18cb1f11745d9046f4ffa1b1a428
-
SHA256
e9258541a5c96fcacb6a2ce349282db7e9403a16fa9f952e8f1f69929dda7abc
-
SHA512
f8e777ebbf8ef85d0299552f8580adf97af8eb236fd94f998c47417369bebbfeb54882ca34dcd60c9444cc4624fa0f8d8f32c8037abe29dd50a0b6f478c842f1
Static task
static1
Behavioral task
behavioral1
Sample
suddenlinkfile08.11.2022.docm
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
suddenlinkfile08.11.2022.docm
Resource
win10v2004-20220721-en
Malware Config
Extracted
icedid
3570055661
alexbionka.com
Targets
-
-
Target
suddenlinkfile08.11.2022.doc
-
Size
2.3MB
-
MD5
3b6a5f7e4f048cb005496243fe2a019e
-
SHA1
a2f68a276e0b18cb1f11745d9046f4ffa1b1a428
-
SHA256
e9258541a5c96fcacb6a2ce349282db7e9403a16fa9f952e8f1f69929dda7abc
-
SHA512
f8e777ebbf8ef85d0299552f8580adf97af8eb236fd94f998c47417369bebbfeb54882ca34dcd60c9444cc4624fa0f8d8f32c8037abe29dd50a0b6f478c842f1
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-