Analysis
-
max time kernel
166s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 03:14
Static task
static1
Behavioral task
behavioral1
Sample
6e19add81ea292a2e62357b9929a850ec4ed16f12040f49a5bbe0f1038812c42.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
6e19add81ea292a2e62357b9929a850ec4ed16f12040f49a5bbe0f1038812c42.exe
-
Size
64KB
-
MD5
d40ab1b49cd288ceb9e916ee64799ae1
-
SHA1
e34edbe081b6639f54347aa8a5f804a792af2efd
-
SHA256
6e19add81ea292a2e62357b9929a850ec4ed16f12040f49a5bbe0f1038812c42
-
SHA512
8cc7c518541b3741b860e299b6de61e89dce19ba7ef20285c15d9b43d6d59d42dc2c7c7b9f9b6704cf105f4e8eb8bc3a8c552734caa214359f625fe9f2393c94
Malware Config
Extracted
Family
icedid
Botnet
2564056318
C2
sheaffic.org
memphase.com
vulcate.com
sheaffic.com
eurobable.com
Attributes
-
auth_var
1
-
url_path
/index.php
Signatures
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
IcedID Second Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2844-146-0x0000000002320000-0x0000000002325000-memory.dmp IcedidSecondLoader -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
6e19add81ea292a2e62357b9929a850ec4ed16f12040f49a5bbe0f1038812c42.exepid process 2844 6e19add81ea292a2e62357b9929a850ec4ed16f12040f49a5bbe0f1038812c42.exe