Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
24-11-2021 16:59
Static task
static1
Behavioral task
behavioral1
Sample
group_32.tmp.dll
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
group_32.tmp.dll
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
group_32.tmp.dll
-
Size
64KB
-
MD5
c55e8acda4c82f0b7a2fc7219f8e26e8
-
SHA1
58c39f7d467bbddca5ab9e4ce30f5c033b1095a0
-
SHA256
db4a745a21bd1175ff679e24b937c1966c2f42394609cea21fd7d309f94c4500
-
SHA512
474828e534f7daa4d2800a5746892786caad74256fd21056e4ccc6aa4283f59d7e2d33e8a992095d602a3fdf7b9758498dee43257dd0d8f4ef80a113b6d17959
Score
10/10
Malware Config
Extracted
Family
icedid
Botnet
2237127122
C2
lokidasterreno.site
burgomustopr.rest
lopityr4.pw
rocesdilin.top
Attributes
-
auth_var
6
-
url_path
/posts/
Signatures
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3816-115-0x0000018BC17D0000-0x0000018BC1807000-memory.dmpFilesize
220KB