Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
24-11-2021 16:59
Static task
static1
Behavioral task
behavioral1
Sample
group_32.tmp.dll
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
group_32.tmp.dll
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
group_32.tmp.dll
-
Size
64KB
-
MD5
c55e8acda4c82f0b7a2fc7219f8e26e8
-
SHA1
58c39f7d467bbddca5ab9e4ce30f5c033b1095a0
-
SHA256
db4a745a21bd1175ff679e24b937c1966c2f42394609cea21fd7d309f94c4500
-
SHA512
474828e534f7daa4d2800a5746892786caad74256fd21056e4ccc6aa4283f59d7e2d33e8a992095d602a3fdf7b9758498dee43257dd0d8f4ef80a113b6d17959
Score
10/10
Malware Config
Extracted
Family
icedid
Botnet
2237127122
C2
lokidasterreno.site
burgomustopr.rest
lopityr4.pw
rocesdilin.top
Attributes
-
auth_var
6
-
url_path
/posts/
Signatures
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1604-55-0x0000000000430000-0x0000000000467000-memory.dmpFilesize
220KB