Analysis
-
max time kernel
91s -
max time network
93s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
01-04-2021 19:46
Static task
static1
Behavioral task
behavioral1
Sample
235d6de72f89720100e2289c3b551145.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
235d6de72f89720100e2289c3b551145.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
235d6de72f89720100e2289c3b551145.dll
-
Size
199KB
-
MD5
235d6de72f89720100e2289c3b551145
-
SHA1
02abd83737ecffc6a02db5bd4eefd52bbd8ff287
-
SHA256
9c44eace5667e2c23b40294ba1875fa8a93b6cf9e40c59bfb2378532cbc81823
-
SHA512
4d4f6aaeeea4a453940fc69f27f5fcc37c2c44f03746b69f8bd35fbb34ade1f63e971c4d45e8698fcb3d6ccdfe3497164a1e2e7eccf18509add84809408ac049
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1584008337
C2
stoikoplot.xyz
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/744-3-0x0000000000140000-0x0000000000147000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 744 regsvr32.exe 744 regsvr32.exe