General
-
Target
3f2c479933e764f90d6158ecc7bd43854bb2349410271ccdb4196f7832983aa0
-
Size
200KB
-
Sample
220701-cymavsgcdk
-
MD5
e79623d287cd17e5a295bbf535ee4c51
-
SHA1
a5865327cd7eb1bca9f5865782ca3cbcafd2646a
-
SHA256
3f2c479933e764f90d6158ecc7bd43854bb2349410271ccdb4196f7832983aa0
-
SHA512
5f2fc6e3fec8566aaf7f59871e04f99dbec63abdf17922ddf9234c6199f01bbcc6d18fe10dd2cd8d50df1dc82307478fb96054bce5b40c252ba6e55a39b35dd3
Static task
static1
Behavioral task
behavioral1
Sample
3f2c479933e764f90d6158ecc7bd43854bb2349410271ccdb4196f7832983aa0.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3f2c479933e764f90d6158ecc7bd43854bb2349410271ccdb4196f7832983aa0.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
icedid
2999192557
gertuko.top
hiperdom.top
-
auth_var
2
-
url_path
/index.php
Targets
-
-
Target
3f2c479933e764f90d6158ecc7bd43854bb2349410271ccdb4196f7832983aa0
-
Size
200KB
-
MD5
e79623d287cd17e5a295bbf535ee4c51
-
SHA1
a5865327cd7eb1bca9f5865782ca3cbcafd2646a
-
SHA256
3f2c479933e764f90d6158ecc7bd43854bb2349410271ccdb4196f7832983aa0
-
SHA512
5f2fc6e3fec8566aaf7f59871e04f99dbec63abdf17922ddf9234c6199f01bbcc6d18fe10dd2cd8d50df1dc82307478fb96054bce5b40c252ba6e55a39b35dd3
Score10/10-
IcedID Second Stage Loader
-