Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
02-05-2022 11:35
Static task
static1
Behavioral task
behavioral1
Sample
4fd7ce0338386d2af9c3b7878adc006165be1a5681fbacfe68137b2fe0a3722d.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
4fd7ce0338386d2af9c3b7878adc006165be1a5681fbacfe68137b2fe0a3722d.exe
-
Size
104KB
-
MD5
5e78ec29e0b3031de4c98364efa10276
-
SHA1
322494b0b7569336f8c51b021cc3bbc9ce50783e
-
SHA256
4fd7ce0338386d2af9c3b7878adc006165be1a5681fbacfe68137b2fe0a3722d
-
SHA512
8a5d76a4d9d200c730bacedde5ce30f64f918427908c80c85ad6c6c43b596d286d80232bbe658f6746c0c5622e0396327abdd8101bd0e324a22c01f43020990d
Malware Config
Extracted
Family
icedid
C2
linvorodana.cyou
kremlinvorona.pw
Signatures
-
IcedID Second Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4100-130-0x0000000000F00000-0x0000000000F06000-memory.dmp IcedidSecondLoader behavioral2/memory/4100-131-0x0000000000F00000-0x000000000100F000-memory.dmp IcedidSecondLoader