Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24-03-2021 17:45
Static task
static1
Behavioral task
behavioral1
Sample
e72f317151dde84d5a8860ba9ebfed0f84bdadc79fbd5c180c0453e65a7b95ae.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e72f317151dde84d5a8860ba9ebfed0f84bdadc79fbd5c180c0453e65a7b95ae.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
e72f317151dde84d5a8860ba9ebfed0f84bdadc79fbd5c180c0453e65a7b95ae.dll
-
Size
79KB
-
MD5
72ca638a8278cc61b8a10145591c204d
-
SHA1
c3a63607d4089d2c4092a97b8f86d1b0e9a0a5ab
-
SHA256
e72f317151dde84d5a8860ba9ebfed0f84bdadc79fbd5c180c0453e65a7b95ae
-
SHA512
f55526414b8ea479013f40fa8c8d8bef8800a7ca59165e3c63ac0f697b1dab75c0c82f04f1d428324b41d6aec45fafba3e0139da30348625582f93bd7e3a6216
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1211238709
C2
912caporers.fun
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/528-3-0x0000000000130000-0x0000000000137000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 528 regsvr32.exe 528 regsvr32.exe