General
-
Target
WSGaRIW.dll
-
Size
140KB
-
Sample
210121-qqz8wv28w6
-
MD5
4fbee1cbb17b4a05ae5b5431a76087fb
-
SHA1
44ffaa43eb2bba71325d406703ad82e010376cac
-
SHA256
e02483eca255879ba6a57365dbecb56f5049283d8cd3f030dceca5c69f7af161
-
SHA512
f1c0cf3e5f00e63d8edcb1cf171fde79b72945ab0d9bdd8a4ecb84b3a2b37d08eec0a59926b10a6cfaa97409a5bcb372805d09aab5e9248cde85bcb5b83fec93
Static task
static1
Behavioral task
behavioral1
Sample
WSGaRIW.dll
Resource
win7v20201028
Malware Config
Extracted
icedid
klopperflitter.cyou
Targets
-
-
Target
WSGaRIW.dll
-
Size
140KB
-
MD5
4fbee1cbb17b4a05ae5b5431a76087fb
-
SHA1
44ffaa43eb2bba71325d406703ad82e010376cac
-
SHA256
e02483eca255879ba6a57365dbecb56f5049283d8cd3f030dceca5c69f7af161
-
SHA512
f1c0cf3e5f00e63d8edcb1cf171fde79b72945ab0d9bdd8a4ecb84b3a2b37d08eec0a59926b10a6cfaa97409a5bcb372805d09aab5e9248cde85bcb5b83fec93
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
IcedID First Stage Loader
-
Blocklisted process makes network request
-