General

  • Target

    2023-04-27_1ac394ddbf23133627ffd200704a247e_icedid_satan_teardrop.exe.bin

  • Size

    5.0MB

  • MD5

    1ac394ddbf23133627ffd200704a247e

  • SHA1

    bc1c8ad6d75714352fe7665e8ea18df883b79f78

  • SHA256

    e597b161cf2d643c4e579ef238ca111d23efd5d8a832f1be0fd8b0dae78ec0af

  • SHA512

    2b9ea36eb2114dd83ab34615a31a2fbc2d9fe62c3e09ce820273ec719945cef28db0376c635a0c682dd16fea273cbad544deb32a1da88f6661595d0b97b68902

  • SSDEEP

    49152:NtErfhsOSMa1xYus4Q2D2TgG6hN3gSVsmqoyeBe4:NtEbfa1xNL2g3mrEB/

Malware Config

Extracted

Family

icedid

Signatures

  • Detected TEARDROP fileless dropper 1 IoCs

    TEARDROP is a memory-only dropper which can read files/registry keys, decode an embedded payload, and load it directly into memory.

  • Icedid family
  • Matiex Main payload 1 IoCs
  • Matiex family
  • Teardrop family
  • Detectes Phoenix Miner Payload 1 IoCs

Files

  • 2023-04-27_1ac394ddbf23133627ffd200704a247e_icedid_satan_teardrop.exe.bin
    .exe .js windows x86