Analysis
-
max time kernel
4s -
max time network
10s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24-03-2021 17:57
Static task
static1
Behavioral task
behavioral1
Sample
916d710afb9e392cbe41724ac1b56260.dll
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
916d710afb9e392cbe41724ac1b56260.dll
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
916d710afb9e392cbe41724ac1b56260.dll
-
Size
79KB
-
MD5
916d710afb9e392cbe41724ac1b56260
-
SHA1
89e1d513a57adde5c303aa0fae254570dabb55de
-
SHA256
f9bc178dcda4b358fae59e686c38a997d7139fbb49d4dc8997c0b725932c44b4
-
SHA512
f43d980774aed0df2467689f8160fa1fdcb0457047a89bfb16a934d2386390e5a1014daddacdc92b0727ac4bde60acb4b86550cdbd942a529d38979dfac4348e
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1211238709
C2
912caporers.fun
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/544-3-0x0000000000150000-0x0000000000157000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 544 regsvr32.exe 544 regsvr32.exe