General

  • Target

    20230501db86067871fee95abb1e3abef8c35b54icedidsatanteardrop

  • Size

    5.0MB

  • MD5

    db86067871fee95abb1e3abef8c35b54

  • SHA1

    c5e3d6e75ae08da7cd9dfcf14d68dfc9bfe180b7

  • SHA256

    daed196b1b2af0ae801a06dd6e452f90f4163d53d261548064ffd57843a70ef9

  • SHA512

    3b399d148e70b02be37fd20c3efe1d5e4f65e2dce479d69abb53a7b9513f90f333ced5c74fb69b944cdd97d544bfb3ad596945db9d8857026d793b6e0714cca9

  • SSDEEP

    49152:5tErfhsOSMa1xYus4Q2D2TgG6hN3gSVsmqoyeBe4:5tEbfa1xNL2g3mrEB/

Malware Config

Extracted

Family

icedid

Signatures

  • Detected TEARDROP fileless dropper 1 IoCs

    TEARDROP is a memory-only dropper which can read files/registry keys, decode an embedded payload, and load it directly into memory.

  • Icedid family
  • Matiex Main payload 1 IoCs
  • Matiex family
  • Teardrop family
  • Detectes Phoenix Miner Payload 1 IoCs

Files

  • 20230501db86067871fee95abb1e3abef8c35b54icedidsatanteardrop
    .exe .js windows x86