Analysis
-
max time kernel
3s -
max time network
8s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
02-04-2021 13:12
Static task
static1
Behavioral task
behavioral1
Sample
80ff2a21f0798873593b0f06f0860221019933f12fe4c623fabb5fe1062b4789.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
80ff2a21f0798873593b0f06f0860221019933f12fe4c623fabb5fe1062b4789.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
80ff2a21f0798873593b0f06f0860221019933f12fe4c623fabb5fe1062b4789.dll
-
Size
199KB
-
MD5
1273fa4d6935760f15e42a61045b7a6c
-
SHA1
3017f1ecce5378e7b30ee14f244337c34ca37d48
-
SHA256
80ff2a21f0798873593b0f06f0860221019933f12fe4c623fabb5fe1062b4789
-
SHA512
2da9f1a6217e92afe88e25fb5bbe4f133daa7fb5e56f63d2c5e72a38121d60644e37dd2de022886fd02f43abcaac237a2b514624160ebd219e9994c2757ef700
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1584008337
C2
stoikoplot.xyz
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2032-3-0x0000000000130000-0x0000000000137000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 2032 regsvr32.exe 2032 regsvr32.exe