Analysis
-
max time kernel
187s -
max time network
224s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-05-2022 20:08
Static task
static1
Behavioral task
behavioral1
Sample
60353041233ef3e58ea5aa3351b06cf218da727cce222fe483ea0e817f634ad0.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
60353041233ef3e58ea5aa3351b06cf218da727cce222fe483ea0e817f634ad0.exe
-
Size
268KB
-
MD5
7fc4fbaf58dbe28420dd8883cb1e20db
-
SHA1
ba57795d45fdab496231194477a56ae9c4df73d9
-
SHA256
60353041233ef3e58ea5aa3351b06cf218da727cce222fe483ea0e817f634ad0
-
SHA512
b168aa0dd1e156a37cff5721f9bef0f5fee15ba1005df310ef061d04d19eaaa057ba70fcf87f0b6026b1dbc4545b29816df8b7f23932cd9d97854374812aaa9a
Malware Config
Extracted
Family
icedid
Extracted
Family
icedid
Botnet
22672422
C2
eastzrada.club
feder5ru.club
adwerife.cyou
proanaliz.top
vzaimrazv.cyou
pipulosha.cyou
Attributes
-
auth_var
5
-
url_path
/audio/
Signatures
-
IcedID Second Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/804-130-0x0000000000C90000-0x0000000000DC8000-memory.dmp IcedidSecondLoader behavioral2/memory/804-131-0x0000000000C90000-0x0000000000C96000-memory.dmp IcedidSecondLoader