Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17-11-2020 11:45
Static task
static1
Behavioral task
behavioral1
Sample
3adc9ed342231807a1f3280fb540afa4.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
3adc9ed342231807a1f3280fb540afa4.exe
-
Size
725KB
-
MD5
11768af8d86d10d66fa712d2ab7a6746
-
SHA1
0fdb9c39d18a8518007a47104613aacc0eafbbeb
-
SHA256
3c5a7fcaffea0a07016fce2f047efa8ff55dc38d0c59fe06877a92457e4cc30d
-
SHA512
42b4573399946b17a173bfb69b9c747dddbc2bfeaeb2611afef2a225e9918609b6ab1d353c0422c893ec8a1515bd3e0a8ab86cdf667bfa35fe29e6fd4a410a6c
Malware Config
Extracted
Family
icedid
C2
kostacardsplayer.pro
kostafootball.info
countrylandlords.info
landiscloudlord.red
Signatures
-
IcedID Second Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4752-0-0x0000000000BB0000-0x0000000000BB5000-memory.dmp IcedidSecondLoader -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
3adc9ed342231807a1f3280fb540afa4.exepid process 4752 3adc9ed342231807a1f3280fb540afa4.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4752-0-0x0000000000BB0000-0x0000000000BB5000-memory.dmpFilesize
20KB