General
-
Target
2024-01-01_6d9ae7bd96ad3fe1f1d4ca0085229db8_icedid_xrat
-
Size
4.2MB
-
Sample
240105-gfaasscdar
-
MD5
6d9ae7bd96ad3fe1f1d4ca0085229db8
-
SHA1
27716aab27e51c9054145673c3bb8a6d39d0bbc1
-
SHA256
82dfd095c6d9f8e5e206e74d9717c0e5311d88906b7305052b3d9e5566ed1f83
-
SHA512
c47324dbdb00db41ecfed0603bfb4d6e8d38251c2e8c436fe0728156fdd71b965e7bd7fc45c44068c13bbef9fae9b18ace17f717d34121230acb849466b6ef7b
-
SSDEEP
98304:PAAJ+AYvswvH22SsaNYfdPBldt6+dBcjHk/bzf:ipY7jsbzf
Behavioral task
behavioral1
Sample
2024-01-01_6d9ae7bd96ad3fe1f1d4ca0085229db8_icedid_xrat.exe
Resource
win7-20231215-en
Malware Config
Extracted
quasar
-
reconnect_delay
3000
Extracted
quasar
1.4.1
Office04
frp.deitie.asia:5555
b827dda2-f30e-4465-be3c-2f1d6a93d4a7
-
encryption_key
465C04B3B0E08D663A071A4F330370E7A7DAD7A4
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
2024-01-01_6d9ae7bd96ad3fe1f1d4ca0085229db8_icedid_xrat
-
Size
4.2MB
-
MD5
6d9ae7bd96ad3fe1f1d4ca0085229db8
-
SHA1
27716aab27e51c9054145673c3bb8a6d39d0bbc1
-
SHA256
82dfd095c6d9f8e5e206e74d9717c0e5311d88906b7305052b3d9e5566ed1f83
-
SHA512
c47324dbdb00db41ecfed0603bfb4d6e8d38251c2e8c436fe0728156fdd71b965e7bd7fc45c44068c13bbef9fae9b18ace17f717d34121230acb849466b6ef7b
-
SSDEEP
98304:PAAJ+AYvswvH22SsaNYfdPBldt6+dBcjHk/bzf:ipY7jsbzf
-
Quasar payload
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-