Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24-03-2021 18:33
Static task
static1
Behavioral task
behavioral1
Sample
eeefa993a1d1bca0905796aba25bf4b4.dll
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
eeefa993a1d1bca0905796aba25bf4b4.dll
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
eeefa993a1d1bca0905796aba25bf4b4.dll
-
Size
79KB
-
MD5
eeefa993a1d1bca0905796aba25bf4b4
-
SHA1
025f137d55e55c1d797d1885fedafae5c2317fab
-
SHA256
4ad15bc9ec0efe437e66ed99091e809e528480eddcd49fe154c4048efe6acb5f
-
SHA512
e44b80f361b50e50b4843d979e001d453e5d329e2b202838d38e4e63e3f28aac09fe0fc645b6e27ef56f0ba4e6cfebc8f585286f10f591a1b6839ca1e5cfb1ca
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1211238709
C2
912caporers.fun
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1676-3-0x0000000000130000-0x0000000000137000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1676 regsvr32.exe 1676 regsvr32.exe