Analysis

  • max time kernel
    13s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    01-04-2021 18:43

General

  • Target

    145440a7c1067bacfcd4d07078040b67c3753e589501bf6f78b970e72c450653.dll

  • Size

    198KB

  • MD5

    2d26d8d47581bcdf0008798c5650df5d

  • SHA1

    756c08c5b9622f1faa5c089296379ea5cdcb6e83

  • SHA256

    145440a7c1067bacfcd4d07078040b67c3753e589501bf6f78b970e72c450653

  • SHA512

    98128c9389909698648775680b6b2ea695b0a10855209d04287f3efa32c6b290f2f876a8a99ba6ba7bcabfc37182ee43ffc36b046cb5e39dbfff9c207a9c1e30

Malware Config

Extracted

Family

icedid

Campaign

1584008337

C2

secondpilots.space

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • IcedID First Stage Loader 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\145440a7c1067bacfcd4d07078040b67c3753e589501bf6f78b970e72c450653.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:580

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/580-2-0x0000000002810000-0x0000000002817000-memory.dmp
    Filesize

    28KB