Behavioral task
behavioral1
Sample
632-133-0x0000029C20BA0000-0x0000029C20BA5000-memory.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
632-133-0x0000029C20BA0000-0x0000029C20BA5000-memory.dll
Resource
win10v2004-20230220-en
General
-
Target
632-133-0x0000029C20BA0000-0x0000029C20BA5000-memory.dmp
-
Size
20KB
-
MD5
43b1e450badb64c0a93ac33e6a7b7cf9
-
SHA1
a0df2a27e31d3ad5ca57dfdaf82e07a415532ecd
-
SHA256
eb61c2a9be47d7d4046bf059e90bc9b0c6a7d1953dc7b5d36492a45d28dbeefc
-
SHA512
c6c9714f3da00862623bbf614fdf8732ddcbc6f1b0f976bb20d4a8816c3dc3aa7e03f6d38c15c7096b526799350a56357a16f457c7b7c17e29810aca60bb36ea
-
SSDEEP
96:8w2G4Oe2NG7IsOV6ZPtEqbJa5rtsRhIc7DI6QZ/B:PeOGkss6xXgH4r0nZB
Malware Config
Extracted
icedid
2941939166
neaachar.com
gyxplonto.com
-
auth_var
9
-
url_path
/news/
Signatures
-
Icedid family
Files
-
632-133-0x0000029C20BA0000-0x0000029C20BA5000-memory.dmp.dll windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 884B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ