General
-
Target
628-56-0x0000000000120000-0x000000000012A000-memory.dmp
-
Size
40KB
-
Sample
220207-sjtdmaddhp
-
MD5
57285626c40ca3ccf51cf28e15fcf914
-
SHA1
a9902ea223e5cdaf00f7d8472c77adfa4cbb0824
-
SHA256
156021c8cc72c13435ff01affcee1b5b648c5ea93007aa5663eec80a16dd8131
-
SHA512
bbe5169fafb4b6d999a911e765920412550c9aca5acb78cee7bb085fae4125f760f2b8fc4af1563e465bbc41f6c46bf02f70e95771f0db1624bcd0de9f582d56
Static task
static1
Behavioral task
behavioral1
Sample
628-56-0x0000000000120000-0x000000000012A000-memory.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
628-56-0x0000000000120000-0x000000000012A000-memory.dll
Resource
win10v2004-en-20220113
Malware Config
Extracted
icedid
1732687004
keepfootbal.com
Targets
-
-
Target
628-56-0x0000000000120000-0x000000000012A000-memory.dmp
-
Size
40KB
-
MD5
57285626c40ca3ccf51cf28e15fcf914
-
SHA1
a9902ea223e5cdaf00f7d8472c77adfa4cbb0824
-
SHA256
156021c8cc72c13435ff01affcee1b5b648c5ea93007aa5663eec80a16dd8131
-
SHA512
bbe5169fafb4b6d999a911e765920412550c9aca5acb78cee7bb085fae4125f760f2b8fc4af1563e465bbc41f6c46bf02f70e95771f0db1624bcd0de9f582d56
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-