Analysis
-
max time kernel
5s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24-03-2021 15:36
Static task
static1
Behavioral task
behavioral1
Sample
d032cd6d252d3424590f782eee582120.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
d032cd6d252d3424590f782eee582120.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
d032cd6d252d3424590f782eee582120.dll
-
Size
79KB
-
MD5
d032cd6d252d3424590f782eee582120
-
SHA1
95d95bf6c28707d7db349082ea0cedf7ddda170d
-
SHA256
f4dee6acb1e449c6fffbc649e4db881e56e4cdee0dd738a6be6fc6fb2e870e3d
-
SHA512
87744e25bbeb1a222494bc976866d79333efbc4b3cbf8e2155c3c292459d8b52e36ad644316136ffbeafd798b5f6da3f198b77018b4548273f54cd29cb9b0a19
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1211238709
C2
912caporers.fun
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1632-3-0x00000000001C0000-0x00000000001C7000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1632 regsvr32.exe 1632 regsvr32.exe