Analysis
-
max time kernel
150s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
68612f05735752add3e960ae05cc10fb.dll
Resource
win7-20220812-en
3 signatures
150 seconds
General
-
Target
68612f05735752add3e960ae05cc10fb.dll
-
Size
243KB
-
MD5
68612f05735752add3e960ae05cc10fb
-
SHA1
4082b1b962dbdd8c85bc2f26df444da3407bce6d
-
SHA256
d7cd3799cc568c8eac4043b578ae3d4d9afffca136f54d7c6016c276e7a7dc12
-
SHA512
e17fe2a19c99bd0a68d109735f62e2822e4803640da9b6eb0a69677b6a8b038e15490efb47ac4c9c34d95aba22b980826f535ea656f417ae5c31d314eed1a07d
-
SSDEEP
3072:f4VuNWaXAAhJHWiCOUzaZvQkGD6a724xuIKhk8nTrQvd2W+q:gVuNWsJWlDn+TUcq
Malware Config
Extracted
Family
icedid
Campaign
809191839
C2
allozelkot.com
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 5 4840 rundll32.exe 33 4840 rundll32.exe 40 4840 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4840 rundll32.exe 4840 rundll32.exe