Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-11-2020 15:48
Static task
static1
Behavioral task
behavioral1
Sample
d84a270e2f6dbcd223c121713afd69c2ad314ac35161d7486b55690517710266.exe
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
d84a270e2f6dbcd223c121713afd69c2ad314ac35161d7486b55690517710266.exe
-
Size
681KB
-
MD5
8cee831dc69f8312e454fe1da77e4bd8
-
SHA1
5087abb2bbe5dda77d0a8720fc4c68c78a912ba4
-
SHA256
d84a270e2f6dbcd223c121713afd69c2ad314ac35161d7486b55690517710266
-
SHA512
db0d96128cdf925ff2a3c6147dc148721e79c9ceafe55a9d559ccb75bdc41022e82f2ba20a687afab4f46e53d2375950c4133db061ece6359022fbf225488def
Malware Config
Extracted
Family
icedid
C2
kostacardsplayer.pro
kostafootball.info
countrylandlords.info
landiscloudlord.red
Signatures
-
IcedID Second Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4040-0-0x00000000006E0000-0x00000000006E5000-memory.dmp IcedidSecondLoader -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
d84a270e2f6dbcd223c121713afd69c2ad314ac35161d7486b55690517710266.exepid process 4040 d84a270e2f6dbcd223c121713afd69c2ad314ac35161d7486b55690517710266.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4040-0-0x00000000006E0000-0x00000000006E5000-memory.dmpFilesize
20KB