Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
06-05-2021 16:54
Static task
static1
Behavioral task
behavioral1
Sample
6e12475814e89c75ead27a22fe4d39e3.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
6e12475814e89c75ead27a22fe4d39e3.dll
-
Size
163KB
-
MD5
6e12475814e89c75ead27a22fe4d39e3
-
SHA1
84b8d91aecf42d519c48ec1d1aeae0140d377e33
-
SHA256
13fa17bdaa50b6ddeabad9b5ad62e269f81ce1295b5847027afc4fc7ceeb1904
-
SHA512
09eb974cf50c0be102e0595c48e05537d6c8c2c28bf77b56f4d7b747f6bff718bd33c5e94a33eac7b572b19f33184c27bbbe4b824737b34f156dfbcc2199d020
Malware Config
Extracted
Family
icedid
Campaign
861670232
C2
provokordino.space
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4064-114-0x00000000008F0000-0x00000000008F7000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 4064 regsvr32.exe 4064 regsvr32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4064-114-0x00000000008F0000-0x00000000008F7000-memory.dmpFilesize
28KB