General

  • Target

    2024-01-09_a3daceeb17d991b35af6bf4e05c0fea4_floxif_icedid

  • Size

    4.6MB

  • Sample

    240110-gpt2kaghap

  • MD5

    a3daceeb17d991b35af6bf4e05c0fea4

  • SHA1

    31566131524d5d62a1ffdf5fd01d78649ee02063

  • SHA256

    1fc7c33aa1b292c9e3c662f2a2dd056ab3eb27025251aeb579c8c834c13758ab

  • SHA512

    78b2f2c47f394eed66d543264d38a4331a5f0153b34628bb5c050c9116da16cf36ada3047ef4d6cd72c68d432e418eb08aa22a1a5f19e6837b2ca1948cc1b4f0

  • SSDEEP

    98304:cv2rFj45EgrVFKq2dW+zPh9L3OYHRCu7IoKRo/FpuwdbaMP2yoS:c+r5UrA/dnbOERCWNDsyoS

Malware Config

Targets

    • Target

      2024-01-09_a3daceeb17d991b35af6bf4e05c0fea4_floxif_icedid

    • Size

      4.6MB

    • MD5

      a3daceeb17d991b35af6bf4e05c0fea4

    • SHA1

      31566131524d5d62a1ffdf5fd01d78649ee02063

    • SHA256

      1fc7c33aa1b292c9e3c662f2a2dd056ab3eb27025251aeb579c8c834c13758ab

    • SHA512

      78b2f2c47f394eed66d543264d38a4331a5f0153b34628bb5c050c9116da16cf36ada3047ef4d6cd72c68d432e418eb08aa22a1a5f19e6837b2ca1948cc1b4f0

    • SSDEEP

      98304:cv2rFj45EgrVFKq2dW+zPh9L3OYHRCu7IoKRo/FpuwdbaMP2yoS:c+r5UrA/dnbOERCWNDsyoS

    • Modifies AppInit DLL entries

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks