Analysis

  • max time kernel
    187s
  • max time network
    198s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    11-05-2022 13:51

General

  • Target

    a4621ec7daf679ae7a1a787dfddfd5c0705dcc9199eb4bb73e16e37e167bd755.exe

  • Size

    228KB

  • MD5

    b08c946dbd7903d782a03427a58e17e2

  • SHA1

    764722588d98efd361638fbca5c1b92bf7ea1c96

  • SHA256

    a4621ec7daf679ae7a1a787dfddfd5c0705dcc9199eb4bb73e16e37e167bd755

  • SHA512

    e6af8b298f402d2093592c025c900139c3da16a7649475fece368d395c34d3a60ecd5dc8efdb6f72e216a9182ceff9fa09fa2154e5b4a6124b9a643074eba544

Malware Config

Extracted

Family

icedid

Extracted

Family

icedid

Botnet

1453255761

C2

startluna.club

lunat.top

Attributes
  • auth_var

    2

  • url_path

    /audio/

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • IcedID Second Stage Loader 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4621ec7daf679ae7a1a787dfddfd5c0705dcc9199eb4bb73e16e37e167bd755.exe
    "C:\Users\Admin\AppData\Local\Temp\a4621ec7daf679ae7a1a787dfddfd5c0705dcc9199eb4bb73e16e37e167bd755.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4292

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4292-130-0x0000000002210000-0x0000000002218000-memory.dmp

    Filesize

    32KB

  • memory/4292-134-0x0000000002230000-0x0000000002236000-memory.dmp

    Filesize

    24KB

  • memory/4292-138-0x0000000002200000-0x0000000002205000-memory.dmp

    Filesize

    20KB