Analysis
-
max time kernel
13s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
24-03-2021 15:36
Static task
static1
Behavioral task
behavioral1
Sample
6e20d1d0a0892035ff8555e3453893b9.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6e20d1d0a0892035ff8555e3453893b9.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
6e20d1d0a0892035ff8555e3453893b9.dll
-
Size
79KB
-
MD5
6e20d1d0a0892035ff8555e3453893b9
-
SHA1
60317694ed35449ff9cfd5d0f46788c02e2ab1c9
-
SHA256
117632a4197ecc5d50272f942f61f329ed094ac5464acbc2bee9bcc0cddf5f6f
-
SHA512
b48767c535bfb607a22393742ee02df04475310808ccce2719e48c8a51d69f8ec7d80a81e875242a048587f53441cb20932e6ff08c0c270078551cc9f68eb9dc
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1211238709
C2
912caporers.fun
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1908-2-0x00000000008E0000-0x00000000008E7000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1908 regsvr32.exe 1908 regsvr32.exe