Analysis
-
max time kernel
46s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12/05/2023, 00:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
40group.exe
Resource
win7-20230220-en
3 signatures
150 seconds
General
-
Target
40group.exe
-
Size
380KB
-
MD5
f59b3c50d97fe7fa58001c345cbea37e
-
SHA1
0e4c394560faf7853bcd9d51b7c959f0a093eb74
-
SHA256
8d5d36c8ffb0a9c81b145aa40c1ff3475702fb0b5f9e08e0577bdc405087e635
-
SHA512
257fb961278b6ac0a399f8e16d7cd7219388010982bb3183cb3c21c5b691a78ae15098b5958e31a385d3ff0b0d35050d72202d70e46e9becdbe830b662994a65
-
SSDEEP
6144:gfmMGxnAR50hXwLhF0l2LF7PWbPINovTnJtKa6hVN:GmMGxAR5xLFQL6/N
Malware Config
Extracted
Family
icedid
Botnet
548174735
C2
magnwnce.com
corposted.com
presifered.com
coujtried.com
molinaro.top
amongolia.com
jjanuatu.com
Attributes
-
auth_var
3
-
url_path
/index.php
Signatures
-
IcedID Second Stage Loader 1 IoCs
resource yara_rule behavioral1/memory/1580-70-0x0000000000610000-0x0000000000615000-memory.dmp IcedidSecondLoader -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1580 40group.exe 1580 40group.exe