Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_e650610dc0420ad6f532e7e2c049bf79_icedid.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_e650610dc0420ad6f532e7e2c049bf79_icedid
-
Size
4.5MB
-
MD5
e650610dc0420ad6f532e7e2c049bf79
-
SHA1
1844d84b33b637403c502d5337dd267b30635af9
-
SHA256
c8af639caedb4a279d7681d68d7c6da6f2177cdb1494fae44cb29eb52063aadb
-
SHA512
8fa9eec9540c05a863ed99576a686d46d874cee8255879b8aee433583f999117fbe22516028f6872cb25ca1cec8b556b32320ad1dd671f53c725f0aa0c3b2885
-
SSDEEP
98304:l5YOXwnS4rVNlS2fP5GAAaukXiNNtVsR3:wIUldfsjsB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-01-25_e650610dc0420ad6f532e7e2c049bf79_icedid
Files
-
2024-01-25_e650610dc0420ad6f532e7e2c049bf79_icedid.exe windows:4 windows x86 arch:x86
0c53a1a0207ad7aea443975148dc2244
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
FreeLibrary
GetProcAddress
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
IsDebuggerPresent
msvcr80
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
__setusermatherr
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
strstr
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 900B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ