Static task
static1
Behavioral task
behavioral1
Sample
2024-01-26_5741a28b8be8038af376436f44b26aa7_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-26_5741a28b8be8038af376436f44b26aa7_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-26_5741a28b8be8038af376436f44b26aa7_icedid
-
Size
1.4MB
-
MD5
5741a28b8be8038af376436f44b26aa7
-
SHA1
b1ec6b7b5240049608a909ceb5e28be0e76f663e
-
SHA256
a12a6bf0cd683efd60ed3ebe181f2dd9b8ff8f375570eb5d517bcac4a439b644
-
SHA512
d336cd6035000054b8b7d9c6967aaa504aa2d81ddc1fd9f9b1fe5ad0c5ae0496489593adb36d657eb5c47cc5b51c7d2173220fca6e8fd7a19e26a3dd7b41594a
-
SSDEEP
24576:DVYfiVs4Mbyk8N7DVnaUoPzanzQRf39O9iW5AOtEl4o:D+cMgN7fsg239gG4o
Malware Config
Signatures
-
Detects executables packed with Enigma 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_Enigma -
Detects packed executables observed in Molerats 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_Loader -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-26_5741a28b8be8038af376436f44b26aa7_icedid
Files
-
2024-01-26_5741a28b8be8038af376436f44b26aa7_icedid.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 684KB - Virtual size: 680KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 144KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.enigma1 Size: 124KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.enigma2 Size: 284KB - Virtual size: 284KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE