Behavioral task
behavioral1
Sample
fucku.exe
Resource
win7-20220718-en
General
-
Target
fucku.exe
-
Size
32KB
-
MD5
0bf8ec378d4f3f2ef4a98fbb47de1ef1
-
SHA1
5aec34e5c1620fb15ce25c856b8f578e3e1459b2
-
SHA256
5fe7fd8c6b0e160b8968e82d3d90569813654aeac2313bc7fdd3284c80cadb7f
-
SHA512
ede1d64b57ffbc5beccb01b27d4f4446712420e10a4689955e2d573fa892d335c8b680ee38d0d339932766beea65be77b86bdccd396d6e942f3403026d72116a
-
SSDEEP
192:ZC+YPv6UOyDqZ1KcMzqTHG+3F+j7rT9z7VYe/7VF5ih27E0mgGn:Zev6UbqZ1K7zX+3q7PEe/7VKh27E0lM
Malware Config
Extracted
icedid
2492795688
greenfairsaid.com
Signatures
-
Icedid family
Files
-
fucku.exe.exe windows x64
6fbc18bbfd8a97d0687e09ebbbcf0792
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WideCharToMultiByte
lstrlenW
VirtualProtect
VirtualAlloc
lstrcatA
lstrcpyA
Sleep
GetTempPathA
CreateDirectoryA
LoadLibraryA
GetProcAddress
GetComputerNameExW
ExitProcess
HeapAlloc
HeapFree
GetProcessHeap
CreateFileA
WriteFile
CloseHandle
HeapReAlloc
GetLastError
SwitchToThread
GetTickCount64
msvcrt
memset
shell32
SHGetFolderPathA
user32
wsprintfW
winhttp
WinHttpSetOption
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpOpenRequest
WinHttpCloseHandle
WinHttpOpen
WinHttpSetStatusCallback
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpConnect
advapi32
GetUserNameW
LookupAccountNameW
Sections
.c Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 4KB - Virtual size: 6B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 396B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.r Size: 4KB - Virtual size: 416B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.d Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE