Analysis
-
max time kernel
11s -
max time network
71s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
24-03-2021 19:23
Static task
static1
Behavioral task
behavioral1
Sample
1f275cc030fc3f46a110063f2235af8b47285d80b8ad4.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1f275cc030fc3f46a110063f2235af8b47285d80b8ad4.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
1f275cc030fc3f46a110063f2235af8b47285d80b8ad4.dll
-
Size
52KB
-
MD5
2564d119818fd65b8230b71854820fe8
-
SHA1
f24b23c44629cead32ec4dc7bbba5f59100a8e9b
-
SHA256
1f275cc030fc3f46a110063f2235af8b47285d80b8ad47eeb3970541b1af95db
-
SHA512
b164c04de10d000e8c0b0738612a870a9014602fc032a16bb7fef643bb56c0dcffbe8950824c0fb5e0e594665f511079b9fe7103b786a71a76b8b6647014753d
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1211238709
C2
feaser2347.club
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1140-2-0x00000000005E0000-0x00000000005E7000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1140 regsvr32.exe 1140 regsvr32.exe