Analysis
-
max time kernel
3s -
max time network
10s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24-03-2021 19:47
Static task
static1
Behavioral task
behavioral1
Sample
55e5345ee7878b520385149a178a76a4.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
55e5345ee7878b520385149a178a76a4.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
55e5345ee7878b520385149a178a76a4.dll
-
Size
52KB
-
MD5
55e5345ee7878b520385149a178a76a4
-
SHA1
0705a0061be6f7f28d2c118d67fcfe6a67aa6217
-
SHA256
b13c2c0450225228615ee4391512575485751cff6160736de95db3ebc8c9c5f0
-
SHA512
d21d3f7672449908327542aa7532dd1ca725a9f77b8685880ed8245aee5dddf0befeaf6cf3c44798792e8959a8c064434a80e4e74452760d23798988ae3c3e49
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1211238709
C2
feaser2347.club
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1632-3-0x0000000000130000-0x0000000000137000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1632 regsvr32.exe 1632 regsvr32.exe