General

  • Target

    2024-02-12_ceeada283ab86ae2b6b0695c98a5003a_icedid

  • Size

    720KB

  • Sample

    240212-y45kaadc47

  • MD5

    ceeada283ab86ae2b6b0695c98a5003a

  • SHA1

    3455052cf0b074a5293459c7b1987debe2bcfbe4

  • SHA256

    e6417eb97d34efa7b7fe845682d61f6a3c47610e8b9dc2ecaa6371c953497cfc

  • SHA512

    a3e2e48cdff324fd10d18cde00d2504c6cce2b032d3daed8735ccac6f015d4197c46cc6b31aaf69b45e1330d9ef70d586297f2625e421ea17ddf7b7d8a27d6b5

  • SSDEEP

    12288:VFFO1aqrLGKX3PxYLcgT9+8hOn26oIatiZCPvBUFhvtff50bn3i/5:VKEXT9i2C6Uq+hvFanyR

Score
9/10

Malware Config

Targets

    • Target

      2024-02-12_ceeada283ab86ae2b6b0695c98a5003a_icedid

    • Size

      720KB

    • MD5

      ceeada283ab86ae2b6b0695c98a5003a

    • SHA1

      3455052cf0b074a5293459c7b1987debe2bcfbe4

    • SHA256

      e6417eb97d34efa7b7fe845682d61f6a3c47610e8b9dc2ecaa6371c953497cfc

    • SHA512

      a3e2e48cdff324fd10d18cde00d2504c6cce2b032d3daed8735ccac6f015d4197c46cc6b31aaf69b45e1330d9ef70d586297f2625e421ea17ddf7b7d8a27d6b5

    • SSDEEP

      12288:VFFO1aqrLGKX3PxYLcgT9+8hOn26oIatiZCPvBUFhvtff50bn3i/5:VKEXT9i2C6Uq+hvFanyR

    Score
    9/10
    • Detects executables containing SQL queries to confidential data stores. Observed in infostealers

    • Detects executables containing possible sandbox analysis VM usernames

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks