Analysis
-
max time kernel
121s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
11-04-2022 03:23
Static task
static1
Behavioral task
behavioral1
Sample
PayPall_Gift10$.exe
Resource
win7-20220331-en
windows7_x64
0 signatures
0 seconds
General
-
Target
PayPall_Gift10$.exe
-
Size
2.5MB
-
MD5
afcc9432a35bcd5fb2cb4d003e88d812
-
SHA1
5e9d2898b4f4172efa0cff2e1aba62eb990cd3a7
-
SHA256
283bd00e86dca8c2a389445ce8b695cf5545655bb99b8798e1c70f7a199b1ae3
-
SHA512
435022ffc51617b6de5ef3ee27b6f514392e6fb4c17e688e5390f25532c7a6cad7bf8a53050814dcca6c3e14be7c51ea364bb20c60633f764acae1cdb42205cd
Malware Config
Extracted
Family
icedid
Campaign
2034606179
C2
rivertimad.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4236-124-0x0000000140000000-0x000000014000B000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
PayPall_Gift10$.exepid process 4236 PayPall_Gift10$.exe 4236 PayPall_Gift10$.exe