Behavioral task
behavioral1
Sample
3612-137-0x000001E993670000-0x000001E993679000-memory.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3612-137-0x000001E993670000-0x000001E993679000-memory.dll
Resource
win10v2004-20240226-en
General
-
Target
3612-137-0x000001E993670000-0x000001E993679000-memory.dmp
-
Size
36KB
-
MD5
caae77466dbab96ea25d6ca51fa78cd9
-
SHA1
6d787a580db67bf6aab9d0771ce7e99bc6e292ca
-
SHA256
0e8fb7c07f311bacaf5d875db9cad74b315f0cafbf9e88c4fb5b97a6f131cfe4
-
SHA512
85fb311e1eadc5155596cfa9342f3445c509d63bfe3e4fccc8eca41b030ea081fa1f9255d3aef27901448047dc4b7df3586b02271b739846aadcae816b490ebc
-
SSDEEP
192:6P+nM5KC/zxayGc3gzq7YjDaqzJCueT+RfbZne9s6PLuZbP0tkYGijY:s5Jxayczq7Yjt9lfle9s6PLy6kYGi8
Malware Config
Extracted
icedid
4230667808
wendoqolta.com
Signatures
-
Icedid family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3612-137-0x000001E993670000-0x000001E993679000-memory.dmp
Files
-
3612-137-0x000001E993670000-0x000001E993679000-memory.dmp.dll windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Sections
.c Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 512B - Virtual size: 6B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 420B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.r Size: 512B - Virtual size: 416B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.d Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE