Analysis
-
max time kernel
172s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
02-05-2022 11:35
Static task
static1
Behavioral task
behavioral1
Sample
729a43fa76a2b217374ba97a0615e3af64e68e1840d2c06702bd429d75fb738e.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
729a43fa76a2b217374ba97a0615e3af64e68e1840d2c06702bd429d75fb738e.exe
-
Size
258KB
-
MD5
e90dabf0d141d8e29dd00dc0908b5891
-
SHA1
e66fc76ada8050dcd5d6ba5f9020a0945e698886
-
SHA256
729a43fa76a2b217374ba97a0615e3af64e68e1840d2c06702bd429d75fb738e
-
SHA512
80ad20e2dc3c406ad0b672440f504ba0bccd9c67fed20b1a6079a742e70135801d8b7e2efc25401f6a476c4618cdb49d69b0dd943da3a8935e92fdde2ffd203b
Malware Config
Extracted
Family
icedid
C2
minishtab.cyou
xoxofuck.cyou
Signatures
-
IcedID Second Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1932-130-0x0000000001000000-0x0000000001141000-memory.dmp IcedidSecondLoader behavioral2/memory/1932-131-0x0000000001000000-0x0000000001006000-memory.dmp IcedidSecondLoader