Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    15-11-2020 22:56

General

  • Target

    1f2b1a13bd2dee7118924867dad18a52ee01eeb8e58876aba3fa286952a719e3.exe

  • Size

    682KB

  • MD5

    77cba469366598d4c01695a9f7ca8389

  • SHA1

    09724565b8114f20d72bc4e7567756cd28fd1edd

  • SHA256

    1f2b1a13bd2dee7118924867dad18a52ee01eeb8e58876aba3fa286952a719e3

  • SHA512

    60adfe1defe6a81c9744783f3afa73716ad40baa08ae6ed94ab443634a97c20bd9a7a7c23f4ef8d3de4794f89cd3bf7a7b77b123daf5459dab0225186d4aff3b

Malware Config

Extracted

Family

icedid

C2

kostacardsplayer.pro

kostafootball.info

countrylandlords.info

landiscloudlord.red

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • IcedID Second Stage Loader 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f2b1a13bd2dee7118924867dad18a52ee01eeb8e58876aba3fa286952a719e3.exe
    "C:\Users\Admin\AppData\Local\Temp\1f2b1a13bd2dee7118924867dad18a52ee01eeb8e58876aba3fa286952a719e3.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4756

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4756-0-0x0000000000730000-0x0000000000735000-memory.dmp

    Filesize

    20KB