Description
IcedID is a banking trojan capable of stealing credentials.
Fri05b5df5106928d62.exe
403KB
211022-rz9j4sbgc5
962b4643e91a2bf03ceeabcdc3d32fff
994eac3e4f3da82f19c3373fdc9b0d6697a4375d
d2671668c6b2c9da5d319e60dea54361a2cbb362e46628cf0dccb5ff0baf786b
ef6f4a5ccfff09506c925003ac49837d771787028fddcf2183e98cba2794df375fd0d5099e36abf8fedfc0dddd10ad076d2fc69a77b8ffd8180215b5cfc88dfd
Family | vidar |
Version | 41.5 |
Botnet | 937 |
C2 |
https://mas.to/@xeroxxx |
Attributes |
profile_id 937 |
Family | redline |
C2 |
205.185.119.191:60857 |
Family | raccoon |
Botnet | 7c9b4504a63ed23664e38808e65948379b790395 |
Attributes |
url4cnc http://telegka.top/capibar http://telegin.top/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
Family | smokeloader |
Version | 2020 |
C2 |
http://directorycart.com/upload/ http://tierzahnarzt.at/upload/ http://streetofcards.com/upload/ http://ycdfzd.com/upload/ http://successcoachceo.com/upload/ http://uhvu.cn/upload/ http://japanarticle.com/upload/ |
rc4.i32 |
|
rc4.i32 |
|
Family | icedid |
Campaign | 1875681804 |
Fri05b5df5106928d62.exe
962b4643e91a2bf03ceeabcdc3d32fff
403KB
994eac3e4f3da82f19c3373fdc9b0d6697a4375d
d2671668c6b2c9da5d319e60dea54361a2cbb362e46628cf0dccb5ff0baf786b
ef6f4a5ccfff09506c925003ac49837d771787028fddcf2183e98cba2794df375fd0d5099e36abf8fedfc0dddd10ad076d2fc69a77b8ffd8180215b5cfc88dfd
IcedID is a banking trojan capable of stealing credentials.
This typically indicates the parent process was compromised via an exploit or macro.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Socelars is an infostealer targeting browser cookies and credit card credentials.
Vidar is an infostealer based on Arkei stealer.
XMRig is a high performance, open source, cross platform CPU/GPU miner.
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
BIOS information is often read in order to detect sandboxing environments.
Looks up country code configured in the registry, likely geofence.
Infostealers often target stored browser data, which can include saved credentials etc.
Detects Themida, an advanced Windows software protection system.
Looks up Uninstall key entries in the registry to enumerate software on the system.
Attempts to read the root path of hard drives other than the default C: drive.
Uses a legitimate IP lookup service to find the infected system's external IP.