Analysis
-
max time kernel
158s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 15:36
Static task
static1
Behavioral task
behavioral1
Sample
4939b61eb011cc10deba126cd09a2106b7ed7c1e41895c00a3de388ca1c5348d.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
4939b61eb011cc10deba126cd09a2106b7ed7c1e41895c00a3de388ca1c5348d.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
4939b61eb011cc10deba126cd09a2106b7ed7c1e41895c00a3de388ca1c5348d.exe
-
Size
405KB
-
MD5
d7e0c89bbb42aef8d64f97a0efb6b1b0
-
SHA1
1600e95f0b4c4dd545adcaefe2ffb1c93eb89989
-
SHA256
4939b61eb011cc10deba126cd09a2106b7ed7c1e41895c00a3de388ca1c5348d
-
SHA512
4b46b5e8ca257e6c51e218cb7c6ce17919a11ea9567868bfe02b22352752ec50e716804a1cce31c6fe26db55135728614353e8491cb81e15eae7a238b7514c21
Score
10/10
Malware Config
Extracted
Family
icedid
Extracted
Family
icedid
Botnet
4253634279
C2
90volizmu.pw
sellsold.pw
Attributes
-
auth_var
2
-
url_path
/audio/
Signatures
-
IcedID Second Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1052-130-0x0000000000650000-0x00000000007B5000-memory.dmp IcedidSecondLoader behavioral2/memory/1052-131-0x0000000000650000-0x0000000000656000-memory.dmp IcedidSecondLoader