Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-11-2020 22:56
Static task
static1
Behavioral task
behavioral1
Sample
1f2b1a13bd2dee7118924867dad18a52ee01eeb8e58876aba3fa286952a719e3.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
1f2b1a13bd2dee7118924867dad18a52ee01eeb8e58876aba3fa286952a719e3.exe
-
Size
682KB
-
MD5
77cba469366598d4c01695a9f7ca8389
-
SHA1
09724565b8114f20d72bc4e7567756cd28fd1edd
-
SHA256
1f2b1a13bd2dee7118924867dad18a52ee01eeb8e58876aba3fa286952a719e3
-
SHA512
60adfe1defe6a81c9744783f3afa73716ad40baa08ae6ed94ab443634a97c20bd9a7a7c23f4ef8d3de4794f89cd3bf7a7b77b123daf5459dab0225186d4aff3b
Malware Config
Extracted
Family
icedid
C2
kostacardsplayer.pro
kostafootball.info
countrylandlords.info
landiscloudlord.red
Signatures
-
IcedID Second Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4756-0-0x0000000000730000-0x0000000000735000-memory.dmp IcedidSecondLoader -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1f2b1a13bd2dee7118924867dad18a52ee01eeb8e58876aba3fa286952a719e3.exepid process 4756 1f2b1a13bd2dee7118924867dad18a52ee01eeb8e58876aba3fa286952a719e3.exe