Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    11-10-2021 14:23

General

  • Target

    a45d940cdf40f849e23fa6837fbd5329aac43bf5.dll

  • Size

    68KB

  • MD5

    faa4adeb8bfdb5b0e9fa046e80d1edc4

  • SHA1

    a45d940cdf40f849e23fa6837fbd5329aac43bf5

  • SHA256

    a102a8d69fbffb877a046f203486657cb522dd53c10a3c93f395a4eb5b6a3dcc

  • SHA512

    06c688006a4084a3cb25ed924ec65e4378a5aaa0c6442d72c939c9fdb3e55eefe3263eb3eef51fa6d94dea3aca02a13b118bf0ddd3b16c17d3d66639803f46a3

Malware Config

Extracted

Family

icedid

Botnet

1217670233

C2

gochihochkiz.fun

oceanmeer.site

amarilloporeder.pw

meeruboot.space

Attributes
  • auth_var

    1

  • url_path

    /posts/

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a45d940cdf40f849e23fa6837fbd5329aac43bf5.dll,#1
    1⤵
      PID:2008

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2008-54-0x0000000000290000-0x00000000002C7000-memory.dmp
      Filesize

      220KB