Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
10-05-2022 18:59
Static task
static1
Behavioral task
behavioral1
Sample
5f42123ef4fc37ff4851a8f585c94ebc1abf0c02e3cc62cba7835497cbe55c8d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5f42123ef4fc37ff4851a8f585c94ebc1abf0c02e3cc62cba7835497cbe55c8d.exe
Resource
win10v2004-20220414-en
General
-
Target
5f42123ef4fc37ff4851a8f585c94ebc1abf0c02e3cc62cba7835497cbe55c8d.exe
-
Size
304KB
-
MD5
ae3b51bf4e30354ce395943fa296bb5b
-
SHA1
6ddaf35f73afbee03cb45192d146c10ecfbe3d35
-
SHA256
5f42123ef4fc37ff4851a8f585c94ebc1abf0c02e3cc62cba7835497cbe55c8d
-
SHA512
0a46bf03cea6b79bb7a718139fdb2b1071697a5c3f31ca1c000c6ec78e54174eeba778383c2bdfc503723c4794310782a54ee7d3b3a03865cda41f6e9d6ecf4f
Malware Config
Extracted
icedid
3266946033
headcaliber.top
destroycruiser.cyou
-
auth_var
1
-
url_path
/audio/
Extracted
icedid
Signatures
-
IcedID Second Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2300-130-0x0000000000430000-0x0000000000436000-memory.dmp IcedidSecondLoader behavioral2/memory/2300-131-0x0000000000430000-0x0000000000578000-memory.dmp IcedidSecondLoader