Analysis
-
max time kernel
4s -
max time network
8s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
21-04-2021 21:57
Static task
static1
Behavioral task
behavioral1
Sample
b52c0640957e5032b5160578f8cb99f9b066fde4f9431.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b52c0640957e5032b5160578f8cb99f9b066fde4f9431.dll
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
b52c0640957e5032b5160578f8cb99f9b066fde4f9431.dll
-
Size
258KB
-
MD5
2cbed069a079c2c57946e9cccb1f1f72
-
SHA1
18c4208d04d1b0a5d0e423cb60ca87fd64eabf80
-
SHA256
b52c0640957e5032b5160578f8cb99f9b066fde4f9431ee6869b2eea67338f28
-
SHA512
372cc5969492964dcbed070981b1fd443b53e1fbc23664f75bfa01ee96aefc733998ff9d586b8099f455a7f3546cfcf4190038a9dfeb54d94903d0f4beba84c4
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
3351099083
C2
vaclicinni.xyz
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1944-60-0x00000000002B0000-0x00000000002B7000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1944 regsvr32.exe 1944 regsvr32.exe