Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    24-11-2021 16:59

General

  • Target

    lbtjxtqmrfi.dll

  • Size

    238KB

  • MD5

    a8913b58338588117e971624e77673df

  • SHA1

    42bd069c90380f45e90b48189ea67c757f7add50

  • SHA256

    275cc0e74f49684fc38ea1084b1cc332c7cdcca7ab8ac0700487bf00eda9c91d

  • SHA512

    b7a1b9324993fe582262526f2c3981408fdef835434bed22d8d885120528bfac6652ab6abfbccb073af2cacac8f4effaf42b47fdffa7617bfc27c6b104c11a57

Malware Config

Extracted

Family

icedid

Campaign

4191098835

C2

overpasta.ink

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\lbtjxtqmrfi.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1924

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1924-55-0x000007FEFBBE1000-0x000007FEFBBE3000-memory.dmp
    Filesize

    8KB

  • memory/1924-56-0x0000000000130000-0x0000000000193000-memory.dmp
    Filesize

    396KB