Analysis
-
max time kernel
4s -
max time network
8s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24-03-2021 21:07
Static task
static1
Behavioral task
behavioral1
Sample
5e92ceb52ec8402a0a3320814653936c.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
5e92ceb52ec8402a0a3320814653936c.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
5e92ceb52ec8402a0a3320814653936c.dll
-
Size
52KB
-
MD5
5e92ceb52ec8402a0a3320814653936c
-
SHA1
92ca7ff0fa0af329cd08a1202c1fc7849e7cc7d5
-
SHA256
09aaa1344cccfde7bd39a487db71325d652aa9f2494ff6a18b14c00930ef7da3
-
SHA512
f3546cfffa26b503dff788322c42b6489e1c3ffd1fa7298b506db5f10563f2a73a5ec638ad8f37e05266e525b146655b1a880637c9a10e62ad28968b2ad2f8db
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1211238709
C2
feaser2347.club
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1056-3-0x00000000001C0000-0x00000000001C7000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1056 regsvr32.exe 1056 regsvr32.exe