Analysis
-
max time kernel
123s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
10-05-2021 18:08
Static task
static1
Behavioral task
behavioral1
Sample
b2715b04c731c53b81b7edad1299413a.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
b2715b04c731c53b81b7edad1299413a.dll
-
Size
183KB
-
MD5
b2715b04c731c53b81b7edad1299413a
-
SHA1
019c266985428e328b1efb26e803954ad9229c83
-
SHA256
51cfaf0e7df40e783d3636b6768fed03261cee616cc84b62da787ec4520739c5
-
SHA512
d9c9c2c4cb9b2fd098c19a021ca2110231a16f30b520af9ec908b332a2d79e114128f5df83e3e8a2a6237725113f02d9ef01ab5b8a044b9a01532aefad981312
Malware Config
Extracted
Family
icedid
Campaign
861670232
C2
provokordino.space
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3980-114-0x0000000000BD0000-0x0000000000BD7000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 3980 regsvr32.exe 3980 regsvr32.exe