init
Behavioral task
behavioral1
Sample
a3fa68045d0106d6db3d43df6b5997d9034f9f7d2a34148187498e4b504ebf58.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3fa68045d0106d6db3d43df6b5997d9034f9f7d2a34148187498e4b504ebf58.dll
Resource
win10v2004-20240412-en
General
-
Target
726633284931ff2411cc3b2bae2e80de4548b8e5f0b9023ae147a279ca5a3233
-
Size
6KB
-
MD5
b083c6bb35f00f27e72c9ad927347aed
-
SHA1
1df001abc683eef19ad83dc550b29e993aa6b329
-
SHA256
726633284931ff2411cc3b2bae2e80de4548b8e5f0b9023ae147a279ca5a3233
-
SHA512
7c02a2a076dae668aa9a43627085af9b942f130868ae977eea18912e1ca372fcf7f51d59fe3986f3e75eba3c8dfd45aafd7119ff1584bf13918400766e3d06ad
-
SSDEEP
192:nL48DesHz289OkeALo7VXcbUFmUnODIqgKTxnM:nLVDeua89wAU7dVG7xnM
Malware Config
Extracted
icedid
4165079571
podiumstrtss.com
Signatures
-
Icedid family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/a3fa68045d0106d6db3d43df6b5997d9034f9f7d2a34148187498e4b504ebf58.exe
Files
-
726633284931ff2411cc3b2bae2e80de4548b8e5f0b9023ae147a279ca5a3233.zip
Password: infected
-
a3fa68045d0106d6db3d43df6b5997d9034f9f7d2a34148187498e4b504ebf58.exe.dll windows:6 windows x64 arch:x64
c8c62b0edf4a5f76dfd31e8262b5adbe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
winhttp
WinHttpCloseHandle
WinHttpOpen
WinHttpConnect
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpenRequest
WinHttpSetOption
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpSetStatusCallback
shell32
SHGetFolderPathA
msvcrt
memset
user32
wsprintfW
kernel32
WideCharToMultiByte
lstrlenW
VirtualProtect
VirtualAlloc
lstrcatA
lstrcpyA
GetTempPathA
CreateDirectoryA
LoadLibraryA
GetProcAddress
GetComputerNameExW
GetTickCount64
SwitchToThread
GetLastError
HeapReAlloc
CloseHandle
Sleep
ExitProcess
CreateThread
HeapAlloc
HeapFree
GetProcessHeap
CreateFileA
WriteFile
advapi32
GetUserNameW
LookupAccountNameW
Exports
Exports
Sections
.c Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 512B - Virtual size: 6B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 420B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.r Size: 512B - Virtual size: 416B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.d Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE