Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24-03-2021 18:41
Static task
static1
Behavioral task
behavioral1
Sample
2efeafdcfca03c83061d1ad399af84b48af2459610eb1a0b994b99383db5c2b0.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2efeafdcfca03c83061d1ad399af84b48af2459610eb1a0b994b99383db5c2b0.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
2efeafdcfca03c83061d1ad399af84b48af2459610eb1a0b994b99383db5c2b0.dll
-
Size
79KB
-
MD5
f422491c66fa2c7d9f43dfa0f6d2e144
-
SHA1
e9d9bfab7dc8aa65c2740fe8902b10e3f0ac1ae4
-
SHA256
2efeafdcfca03c83061d1ad399af84b48af2459610eb1a0b994b99383db5c2b0
-
SHA512
3456195cc78dd07de2d6aac866c2a7dc461bd675ecc139de87b584d00a2746078039c9b402b780f6f49c69dffb0791fb28b1499f945adc2d2328a21a571dc064
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1211238709
C2
912caporers.fun
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1652-3-0x00000000001B0000-0x00000000001B7000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1652 regsvr32.exe 1652 regsvr32.exe