Analysis
-
max time kernel
13s -
max time network
111s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
02-04-2021 08:56
Static task
static1
Behavioral task
behavioral1
Sample
1e79c881582c2c4cf58783513f9125867073f568cbe13.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1e79c881582c2c4cf58783513f9125867073f568cbe13.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
1e79c881582c2c4cf58783513f9125867073f568cbe13.dll
-
Size
199KB
-
MD5
8d05451aba55f305c6567335591d9b8a
-
SHA1
80b43e572c1323bac282a6e66e17888a24b9874e
-
SHA256
1e79c881582c2c4cf58783513f9125867073f568cbe134c843cfb015e9b30b58
-
SHA512
0620a3273a1a4ee9518183436f998ddd42d64466d176e46d6673fd11994802fdbb376d062b595f626a14e6fe23afa9d8a9d2099e4897233eaa946e46a02b25cd
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1584008337
C2
stoikoplot.xyz
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1048-2-0x0000000002D60000-0x0000000002D67000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1048 regsvr32.exe 1048 regsvr32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1048-2-0x0000000002D60000-0x0000000002D67000-memory.dmpFilesize
28KB