init
Behavioral task
behavioral1
Sample
a3fa68045d0106d6db3d43df6b5997d9034f9f7d2a34148187498e4b504ebf58.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a3fa68045d0106d6db3d43df6b5997d9034f9f7d2a34148187498e4b504ebf58.dll
Resource
win10v2004-20241007-en
General
-
Target
a3fa68045d0106d6db3d43df6b5997d9034f9f7d2a34148187498e4b504ebf58
-
Size
15KB
-
MD5
06cc2fdfd408c15a1e16adfb46e8bb38
-
SHA1
585cfc19bdb8dfb92407e917615be1ab9dd523e5
-
SHA256
a3fa68045d0106d6db3d43df6b5997d9034f9f7d2a34148187498e4b504ebf58
-
SHA512
eb11a4b40eb20610f3296af8c8a7c8af5934e10922146fdc524b8212077025ccd22aa69e16aa38af56a86bd49aedc9a36a00a3cb7de3368b194fe9026ebb18d4
-
SSDEEP
192:6P+nM5KC/zxayGc3gzq7YjDaqzJCueT+RfbZne9s6PLRP0tkYGijY5:s5Jxayczq7Yjt9lfle9s6PL16kYGi85
Malware Config
Extracted
icedid
4165079571
podiumstrtss.com
Signatures
-
Icedid family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource a3fa68045d0106d6db3d43df6b5997d9034f9f7d2a34148187498e4b504ebf58
Files
-
a3fa68045d0106d6db3d43df6b5997d9034f9f7d2a34148187498e4b504ebf58.dll windows:6 windows x64 arch:x64
c8c62b0edf4a5f76dfd31e8262b5adbe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
winhttp
WinHttpCloseHandle
WinHttpOpen
WinHttpConnect
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpenRequest
WinHttpSetOption
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpSetStatusCallback
shell32
SHGetFolderPathA
msvcrt
memset
user32
wsprintfW
kernel32
WideCharToMultiByte
lstrlenW
VirtualProtect
VirtualAlloc
lstrcatA
lstrcpyA
GetTempPathA
CreateDirectoryA
LoadLibraryA
GetProcAddress
GetComputerNameExW
GetTickCount64
SwitchToThread
GetLastError
HeapReAlloc
CloseHandle
Sleep
ExitProcess
CreateThread
HeapAlloc
HeapFree
GetProcessHeap
CreateFileA
WriteFile
advapi32
GetUserNameW
LookupAccountNameW
Exports
Exports
Sections
.c Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 512B - Virtual size: 6B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 420B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.r Size: 512B - Virtual size: 416B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.d Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE