Behavioral task
behavioral1
Sample
3116-1-0x00000000008C0000-0x00000000009EB000-memory.exe
Resource
win10v2004-20250314-en
General
-
Target
3116-1-0x00000000008C0000-0x00000000009EB000-memory.dmp
-
Size
1.2MB
-
MD5
a1f390132a1c323f7ae77971141421b8
-
SHA1
55465debc1e28c42d233b3b75c32ea860482e30c
-
SHA256
4f504d9d3ae8e95ebb98ea153f42de530ca4e9f1e31ff9f5e0778492dc795da2
-
SHA512
a1974adf22b363a70ef56e22d06688360d21ddaeddd4884a069330b99ae4bdd6ee72a43ee2ab38332211894fb3371d50ba3b77d3ba3e4180d3ad518b2b6d96e5
-
SSDEEP
3072:Eh7GHB3898KiMiWVd/ipPZ0W7kRVeG/SnTc+J76Kh2:Ehah3CZDd/YZahW/
Malware Config
Extracted
icedid
Signatures
Files
-
3116-1-0x00000000008C0000-0x00000000009EB000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
bss Size: - Virtual size: 4B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 196B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ