General
Target
Filesize
Completed
Task
0a497cdeb92189e1611c15669897de70e8aed2be2484346686252bea387abfa4_unpacked.dll
13KB
20-05-2022 16:55
behavioral1
Score
10/10
MD5
SHA1
SHA256
SHA512
399e402d426f0675ffcc8efa609421a8
2a2e5b9bf49aca783574fcc2aa4a06dcb609a4c1
42605a1640895ba3d64833f8fc077c074710b142fcb0332607af8560feb64a24
8b70160e6062d1349e5d6fef9d2b73c12f1ddfa01aa6c7eb4735b614fa6d34c225ea2b5aa52be0c9c01af07bba9f5a2f44809a99186b5fe69ff1488c398b7702
Malware Config
Extracted
Family | icedid |
Campaign | 3118344709 |
Signatures 3
Filter: none
-
IcedID, BokBot
Description
IcedID is a banking trojan capable of stealing credentials.
Tags
-
suricata: ET MALWARE Win32/IcedID Request Cookie
Description
suricata: ET MALWARE Win32/IcedID Request Cookie
Tags
-
Suspicious behavior: EnumeratesProcessesregsvr32.exe
Reported IOCs
pid process 852 regsvr32.exe 852 regsvr32.exe
Processes 1
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\0a497cdeb92189e1611c15669897de70e8aed2be2484346686252bea387abfa4_unpacked.dllSuspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
00:00
00:00
Downloads
-
memory/852-54-0x000007FEFBCD1000-0x000007FEFBCD3000-memory.dmp
Title
Loading data