Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-05-2022 21:27
Static task
static1
Behavioral task
behavioral1
Sample
08966fc06c2e26f4dbb36f50812afd3863aa7ae04463bc931506a97a8d866cd5.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
08966fc06c2e26f4dbb36f50812afd3863aa7ae04463bc931506a97a8d866cd5.exe
-
Size
220KB
-
MD5
1a7c450bdcfe99da1427d976de6d7246
-
SHA1
ddd5895e7837abfed13e28630e21884901966f4f
-
SHA256
08966fc06c2e26f4dbb36f50812afd3863aa7ae04463bc931506a97a8d866cd5
-
SHA512
0403918e746f9906e91a90bc3442649666ef49ac559d53daca6b25a50ca067d20926dd5a3f7f097a91df3b6db07396d011bbe41f3a3deb3a2010ce2f9e82fa37
Malware Config
Extracted
Family
icedid
Botnet
513366864
C2
gfthwards.com
gfthwards.eu
gfthwards.net
presifered.com
Attributes
-
auth_var
8
-
url_path
/index.php
Signatures
-
IcedID Second Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/376-71-0x0000000000310000-0x0000000000315000-memory.dmp IcedidSecondLoader -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
08966fc06c2e26f4dbb36f50812afd3863aa7ae04463bc931506a97a8d866cd5.exepid process 376 08966fc06c2e26f4dbb36f50812afd3863aa7ae04463bc931506a97a8d866cd5.exe 376 08966fc06c2e26f4dbb36f50812afd3863aa7ae04463bc931506a97a8d866cd5.exe