Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24-03-2021 18:10
Static task
static1
Behavioral task
behavioral1
Sample
f9bc178dcda4b358fae59e686c38a997d7139fbb49d4dc8997c0b725932c44b4.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
f9bc178dcda4b358fae59e686c38a997d7139fbb49d4dc8997c0b725932c44b4.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
f9bc178dcda4b358fae59e686c38a997d7139fbb49d4dc8997c0b725932c44b4.dll
-
Size
79KB
-
MD5
916d710afb9e392cbe41724ac1b56260
-
SHA1
89e1d513a57adde5c303aa0fae254570dabb55de
-
SHA256
f9bc178dcda4b358fae59e686c38a997d7139fbb49d4dc8997c0b725932c44b4
-
SHA512
f43d980774aed0df2467689f8160fa1fdcb0457047a89bfb16a934d2386390e5a1014daddacdc92b0727ac4bde60acb4b86550cdbd942a529d38979dfac4348e
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1211238709
C2
912caporers.fun
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1924-3-0x00000000004B0000-0x00000000004B7000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1924 regsvr32.exe 1924 regsvr32.exe