Static task
static1
Behavioral task
behavioral1
Sample
2024-01-26_99745dbd0b6ccab17a767053f9c4d145_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-26_99745dbd0b6ccab17a767053f9c4d145_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-26_99745dbd0b6ccab17a767053f9c4d145_icedid
-
Size
1.7MB
-
MD5
99745dbd0b6ccab17a767053f9c4d145
-
SHA1
b0311b80bac15d1d7c3ac38db038f02ca78aeb87
-
SHA256
ada1d6d9bd7ab0845049585c9851bceb7cb9d735561a3a92f7d984257c6ce785
-
SHA512
b80f1cbbbf87a02582fac08d57c5bd7e41d4b7b4c5e1e91909fec0769d81cb2aa3278f84a94500025e0e6ddee7a9eba6af1056186e296af100124d8d14c5e86d
-
SSDEEP
24576:MVYfiVs4Mbyk8N7DVnaUoP4aYcoyUlzEtj7tNcqmf39dWW5Aje7l4op:M+cMgN7fs4yyEt/439WG4op
Malware Config
Signatures
-
Detects executables packed with Enigma 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_Enigma -
Detects packed executables observed in Molerats 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_Loader -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-26_99745dbd0b6ccab17a767053f9c4d145_icedid
Files
-
2024-01-26_99745dbd0b6ccab17a767053f9c4d145_icedid.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 684KB - Virtual size: 680KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 144KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 428KB - Virtual size: 428KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.enigma1 Size: 124KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.enigma2 Size: 284KB - Virtual size: 284KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE