Behavioral task
behavioral1
Sample
1964-234-0x0000000180000000-0x0000000180009000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1964-234-0x0000000180000000-0x0000000180009000-memory.dll
Resource
win10v2004-20220812-en
General
-
Target
1964-234-0x0000000180000000-0x0000000180009000-memory.dmp
-
Size
36KB
-
MD5
f9c866af416c8327aa8660c6d4b517dd
-
SHA1
e152b41764eb3b867eee9d5e22b2da77bf2404da
-
SHA256
08e6e758d807b87cef436d121ee4edf32d3fde4f4b7951a18fc01f9fd257d1ef
-
SHA512
4b4367029e6c63b508148bfba4891c45866d132b33ae817dd721b7ddb4f3ee7723c16e1b148bedb322b37e62ecced96bec9ed93aa24c711027520b50f8208a19
-
SSDEEP
192:hHVMfa7TTCjJSixzPSAA56RCK7Yu/VPgwJmXBAQYfPq/3Kbr:h1Mf0gJSix2AA56RCiZVAGQYnq/6b
Malware Config
Extracted
icedid
742081363
scainznorka.com
Signatures
-
Icedid family
Files
-
1964-234-0x0000000180000000-0x0000000180009000-memory.dmp.dll windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.c Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 512B - Virtual size: 6B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 420B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.r Size: 512B - Virtual size: 418B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.d Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE