Analysis
-
max time kernel
155s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 17:21
Static task
static1
Behavioral task
behavioral1
Sample
0819bba4f240548fad8b3cf7d3e7615b.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
0819bba4f240548fad8b3cf7d3e7615b.dll
-
Size
534KB
-
MD5
0819bba4f240548fad8b3cf7d3e7615b
-
SHA1
898a736a3ee5ad62b5bfaa7008f0482622a440a3
-
SHA256
2f92393ce47705824b329f3613c2b6936e5e7a6efb4c93f04e6bf0cdc665095a
-
SHA512
e05aacf3c8851c2309f26b9a38be4a84a7813a0dcd35fa86c466ada4d57640db4d0641dd22af2e564578e852708b725b2f79ffe88985bd09ab26c29bba90b959
Malware Config
Extracted
Family
icedid
Campaign
227378761
C2
blionarywesta.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 6 5020 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 5020 rundll32.exe 5020 rundll32.exe