Behavioral task
behavioral1
Sample
1340-54-0x0000000180000000-0x0000000180009000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1340-54-0x0000000180000000-0x0000000180009000-memory.dll
Resource
win10v2004-20220812-en
General
-
Target
1340-54-0x0000000180000000-0x0000000180009000-memory.dmp
-
Size
36KB
-
MD5
0a52bb621aa136c2d225d75ce2b5e4a0
-
SHA1
7515ee710a06bc0272477eab05599ef1fd346316
-
SHA256
59315b35c8556c9d6e2f5a6a4b19d5f8adda000a246f33b4b846c57ec3922944
-
SHA512
f224d285d221d81a1d4a333be8bef88b6b1aebc7e01dd8135317536ef20056883017938e66fd1d7d484c88b8176fbe14983963c343aa5b6e55a96771dca7a085
-
SSDEEP
192:hHVMfa7TTCjJSixzPSAA56RCK7Yu/VPgwZOXBAQYfPq/3Kb:h1Mf0gJSix2AA56RCiZVIGQYnq/6b
Malware Config
Extracted
icedid
56237520
tablearmestion.com
Signatures
-
Icedid family
Files
-
1340-54-0x0000000180000000-0x0000000180009000-memory.dmp.dll windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.c Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 512B - Virtual size: 6B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 420B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.r Size: 512B - Virtual size: 418B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.d Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE