Analysis

  • max time kernel
    93s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 18:26

General

  • Target

    6517c8fe6983f6f16c71a859fba02115780d5b12602d56777b6535d7944bdab2N.dll

  • Size

    453KB

  • MD5

    9a05a986015008adf8187220f931b370

  • SHA1

    ceb42a41bbf8a7418d14601f7f81d2d91976dead

  • SHA256

    6517c8fe6983f6f16c71a859fba02115780d5b12602d56777b6535d7944bdab2

  • SHA512

    abeeff61d8ac8fda9a4bcb61647d425fb2fc56a43c92675a9a4c4623dbff16bf250ad4742e8ea5a414b87092f06be74af39668d45dbb61389f68276fd772d37d

  • SSDEEP

    3072:65JOuzQiAIOvJ+1rzyp5cq1LGKFKHrt9F5p3BZiZqBAJLMok3n+CBrMrRZm1xAyV:cJOuZrzyp5V1LGKiBBMSkLTc+yyZmAk

Malware Config

Extracted

Family

icedid

Campaign

2349072319

C2

sebdgoldingor.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6517c8fe6983f6f16c71a859fba02115780d5b12602d56777b6535d7944bdab2N.dll,#1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3180

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3180-0-0x00000251D7110000-0x00000251D7116000-memory.dmp

    Filesize

    24KB

  • memory/3180-1-0x00000251D7130000-0x00000251D7139000-memory.dmp

    Filesize

    36KB