Analysis
-
max time kernel
4294212s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
14-04-2022 14:30
Static task
static1
Behavioral task
behavioral1
Sample
eb58a35e3b3ca4fcd7d075bb5d103548e90b16cb2211a3f81a5a7086932574d8.exe
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
General
-
Target
eb58a35e3b3ca4fcd7d075bb5d103548e90b16cb2211a3f81a5a7086932574d8.exe
-
Size
220KB
-
MD5
b338366a45738ac9256ea046a67ec1d1
-
SHA1
a100f87c0818f9a2b9f1ad4e1e2d424b029f6a8a
-
SHA256
eb58a35e3b3ca4fcd7d075bb5d103548e90b16cb2211a3f81a5a7086932574d8
-
SHA512
325e0e5297384e09e0c7d0d921383af6824dbf31cf2de47d6cb898d5355e2406c07bd7965d76f01b9a9e126cb2730419d31038201305d3aab5f790665c9cee10
Malware Config
Extracted
Family
icedid
C2
firstcovo.pw
kilohardtostop.pw
dalobecu.xyz
googmusi.cyou
Signatures
-
IcedID Second Stage Loader 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1616-55-0x0000000000270000-0x0000000000278000-memory.dmp IcedidSecondLoader behavioral1/memory/1616-57-0x0000000000260000-0x0000000000265000-memory.dmp IcedidSecondLoader behavioral1/memory/1616-60-0x0000000000280000-0x0000000000286000-memory.dmp IcedidSecondLoader -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
eb58a35e3b3ca4fcd7d075bb5d103548e90b16cb2211a3f81a5a7086932574d8.exepid process 1616 eb58a35e3b3ca4fcd7d075bb5d103548e90b16cb2211a3f81a5a7086932574d8.exe 1616 eb58a35e3b3ca4fcd7d075bb5d103548e90b16cb2211a3f81a5a7086932574d8.exe