Analysis
-
max time kernel
4s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24-03-2021 21:07
Static task
static1
Behavioral task
behavioral1
Sample
2139be25c94953899a281828f4782659.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2139be25c94953899a281828f4782659.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
2139be25c94953899a281828f4782659.dll
-
Size
52KB
-
MD5
2139be25c94953899a281828f4782659
-
SHA1
07c032e6e8734dd14586b38542c1423ec6880221
-
SHA256
030e5a36570fb896b3e7b214784c0daa4f60bc60dd05540870ce1331aea2ef22
-
SHA512
cc7394914d99e852569e849b6793b55c1e2976c57495c9181ebd38b7ae163ebd90721696e7cb67317bc4e405d1367d3a14f0fa430ea308d9206f7c892d9608ff
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1211238709
C2
feaser2347.club
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1932-3-0x0000000000140000-0x0000000000147000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1932 regsvr32.exe 1932 regsvr32.exe