Behavioral task
behavioral1
Sample
2036-54-0x0000000000020000-0x0000000000028000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2036-54-0x0000000000020000-0x0000000000028000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
2036-54-0x0000000000020000-0x0000000000028000-memory.dmp
-
Size
32KB
-
MD5
ae8522e5f69db486d01c0f968e9fb9d4
-
SHA1
bfc5be3e908b571d1a50aab6ccc8150ef66c0807
-
SHA256
dce9b6a314e70c7e2011ce13f5d912f504289aebb61043d356917d723bdb5d6d
-
SHA512
96c5e7c98476aa667f43f9f076926a8238968786e9a09ae1fb79c3cf6150b90ae3bf767cb7606d41556dad8f2484494e9890fc026584d62d1053404bad0fd886
-
SSDEEP
192:caBnU7ThdZzpk4EJmxQQTHGKZFTkUV2U+A5+ZrCi5EFyt8xf+rsI:caBUn3Zz6mxQNqNVH+A5+ZrCiif+rsI
Malware Config
Extracted
icedid
4133971563
tadernost.com
Signatures
-
Icedid family
Files
-
2036-54-0x0000000000020000-0x0000000000028000-memory.dmp.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.c Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 512B - Virtual size: 6B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 512B - Virtual size: 420B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.r Size: 512B - Virtual size: 420B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.d Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE