Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    15-11-2020 22:46

General

  • Target

    294793c6b27e42e57631fcaf6d910ba9f93cea52ce60bc3851f208c34475875a.exe

  • Size

    734KB

  • MD5

    46cc3087936f12f41a337b338328d046

  • SHA1

    558ee0f7c54fe6cbaa44c9dd1dc50ee860d29a96

  • SHA256

    294793c6b27e42e57631fcaf6d910ba9f93cea52ce60bc3851f208c34475875a

  • SHA512

    6041d09b4ef21bf9fe0745592d521dd49f86da5e0d55103d1281f4896e420862f042b931c7e75ab87a649e5b61767c1248181e940e233f503b2344fb91915427

Malware Config

Extracted

Family

icedid

C2

kostacardsplayer.pro

kostafootball.info

countrylandlords.info

landiscloudlord.red

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • IcedID Second Stage Loader 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\294793c6b27e42e57631fcaf6d910ba9f93cea52ce60bc3851f208c34475875a.exe
    "C:\Users\Admin\AppData\Local\Temp\294793c6b27e42e57631fcaf6d910ba9f93cea52ce60bc3851f208c34475875a.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:744

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/744-0-0x0000000000640000-0x0000000000645000-memory.dmp
    Filesize

    20KB