General
-
Target
courtesyautomotivedoc08.11.doc
-
Size
2.2MB
-
Sample
220811-srbhsagggl
-
MD5
00e8f42e0462d4abf8a6bb6960abe5b5
-
SHA1
0235d1eb73c161a7fcc944d99730d8ed0200fb8e
-
SHA256
3af042bd0b5a186b98920cf0b7066344609d6d6deb163ffb0b60325dcca66e44
-
SHA512
927b5d5c0a8230738b5e56d05f2b0c669c2a564ef013707cce466250ddddb6d779077e4a8ee75ed39bc4a6485cbf30b6ba6edc8f819b74fd3f400e6c84460f96
Static task
static1
Behavioral task
behavioral1
Sample
courtesyautomotivedoc08.11.docm
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
courtesyautomotivedoc08.11.docm
Resource
win10v2004-20220722-en
Malware Config
Extracted
icedid
3570055661
Extracted
icedid
3570055661
alexbionka.com
Targets
-
-
Target
courtesyautomotivedoc08.11.doc
-
Size
2.2MB
-
MD5
00e8f42e0462d4abf8a6bb6960abe5b5
-
SHA1
0235d1eb73c161a7fcc944d99730d8ed0200fb8e
-
SHA256
3af042bd0b5a186b98920cf0b7066344609d6d6deb163ffb0b60325dcca66e44
-
SHA512
927b5d5c0a8230738b5e56d05f2b0c669c2a564ef013707cce466250ddddb6d779077e4a8ee75ed39bc4a6485cbf30b6ba6edc8f819b74fd3f400e6c84460f96
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-