Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 07:33
Static task
static1
Behavioral task
behavioral1
Sample
aee392fa31d863df3c98ffe7d31ba81ec42a1a7f7525b815bad29f46f9a0a1da.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
aee392fa31d863df3c98ffe7d31ba81ec42a1a7f7525b815bad29f46f9a0a1da.exe
-
Size
304KB
-
MD5
c84bf3b108f4008b5657ad663226ad98
-
SHA1
bd8574ee3501ab0526bde421a816c3d7f008e909
-
SHA256
aee392fa31d863df3c98ffe7d31ba81ec42a1a7f7525b815bad29f46f9a0a1da
-
SHA512
64198064f979123a36dbe6f92b4b1ed00b2ee116ab0e45f921344bbf4cd51c90dbf1fc596d68ad0fc069f0fbc55e5bfea10b7427d6eaac4aa3ef935f1862c467
Malware Config
Extracted
Family
icedid
Botnet
548174735
C2
magnwnce.com
corposted.com
presifered.com
coujtried.com
molinaro.top
amongolia.com
jjanuatu.com
Attributes
-
auth_var
3
-
url_path
/index.php
Signatures
-
IcedID Second Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/548-71-0x0000000000280000-0x0000000000285000-memory.dmp IcedidSecondLoader -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
aee392fa31d863df3c98ffe7d31ba81ec42a1a7f7525b815bad29f46f9a0a1da.exepid process 548 aee392fa31d863df3c98ffe7d31ba81ec42a1a7f7525b815bad29f46f9a0a1da.exe