Analysis
-
max time kernel
5s -
max time network
10s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24-03-2021 18:41
Static task
static1
Behavioral task
behavioral1
Sample
baf471f9238cb6b5f1aa9c8a32a948d67900ba988e1324b4bbb4a4287b980566.dll
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
baf471f9238cb6b5f1aa9c8a32a948d67900ba988e1324b4bbb4a4287b980566.dll
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
baf471f9238cb6b5f1aa9c8a32a948d67900ba988e1324b4bbb4a4287b980566.dll
-
Size
79KB
-
MD5
a9dc93822533c45fb0c057878a98cc85
-
SHA1
3d58441f37c471f473f8fc63948f0ae2b92fd906
-
SHA256
baf471f9238cb6b5f1aa9c8a32a948d67900ba988e1324b4bbb4a4287b980566
-
SHA512
23e7882aa4b293455c042f7ab0c0ad72e893ae1887bd906f12ec047d7d3d62950c3d20ea0d8cab10ff9dc984bcd8a36a055a84cc7e906cabaa9fdb3e560c1ea1
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1211238709
C2
912caporers.fun
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1108-3-0x00000000004C0000-0x00000000004C7000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1108 regsvr32.exe 1108 regsvr32.exe