Analysis
-
max time kernel
43s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 17:27
Static task
static1
Behavioral task
behavioral1
Sample
8sLDJbfC.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
8sLDJbfC.dll
-
Size
534KB
-
MD5
c4a9b4f3254be77448f72272765757c7
-
SHA1
40d1d12fe46a0b144f7f4bbb9fcb2a758c141e20
-
SHA256
36bd0d4b2148e6e63469a8f4d5e627224999b1cd65bd0bb760246da35f89147b
-
SHA512
645a7e75b5075febb232fd2b66a128ed0bfcdb710e8340553babd9a86d768404695ab1a0424d29e99d798cdb073626daf0a544558766d809aba70d8381218fc4
Malware Config
Extracted
Family
icedid
Campaign
227378761
C2
blionarywesta.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 3 388 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 388 rundll32.exe 388 rundll32.exe