Resubmissions

17-07-2023 10:29

230717-mh8t2aca5s 10

14-05-2023 09:58

230514-lzglfabe43 10

Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2023 09:58

General

  • Target

    045bf7ea6ea419f43ef8cba44dffb9727e205f1b983f418acc655e66b2de8c1d.exe

  • Size

    606KB

  • MD5

    1390522ffab99c828865258eb7a6aa8c

  • SHA1

    cc2da386b0bca123c7fe5b7568ca69644ffaf947

  • SHA256

    045bf7ea6ea419f43ef8cba44dffb9727e205f1b983f418acc655e66b2de8c1d

  • SHA512

    0dfd1403bf1ac506ceac717c1051375687dd9730c77889e118583160a4168e7a24437109c59a356c961ff4098a1c5a92f1d1add8ab309b30621cae6e3a5119cb

  • SSDEEP

    12288:ylOUH52LLvBH1f4SZ/USfXPiu1+3JxMnsBzXT80ZqC:ylOUH52LdH1gSlUsp+3XMuv8

Malware Config

Extracted

Family

icedid

Campaign

997059431

C2

gintoonafa.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\045bf7ea6ea419f43ef8cba44dffb9727e205f1b983f418acc655e66b2de8c1d.exe
    "C:\Users\Admin\AppData\Local\Temp\045bf7ea6ea419f43ef8cba44dffb9727e205f1b983f418acc655e66b2de8c1d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1948

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1948-54-0x0000000000020000-0x0000000000028000-memory.dmp

    Filesize

    32KB

  • memory/1948-55-0x00000000002E0000-0x0000000000315000-memory.dmp

    Filesize

    212KB