General

  • Target

    2024-02-12_33628cd52b1bfd9542bb92697bed025f_icedid

  • Size

    711KB

  • Sample

    240212-ylteasbc9t

  • MD5

    33628cd52b1bfd9542bb92697bed025f

  • SHA1

    48b61b6d7d39d11328a44ad5afdc8880fbf4a504

  • SHA256

    64d3e011670c866f617d738877c037fe4da74323a2b5b665cd54c0b83b44dd4c

  • SHA512

    45e97242c178b32ac842c92859f1d6c9415022e74cdb2275d8a8bb3b63d7e0d1b207791f0eec176554e0dcebebbf1838d83d905cea7eea501148b6189e54970b

  • SSDEEP

    12288:UyK5t4FM6X3f+B9h2+YEIBAHf267Ir6l4rAKeMb5LCeODyKUqDni:Uz9E+YEIY2pelSfcxUqLi

Score
9/10

Malware Config

Targets

    • Target

      2024-02-12_33628cd52b1bfd9542bb92697bed025f_icedid

    • Size

      711KB

    • MD5

      33628cd52b1bfd9542bb92697bed025f

    • SHA1

      48b61b6d7d39d11328a44ad5afdc8880fbf4a504

    • SHA256

      64d3e011670c866f617d738877c037fe4da74323a2b5b665cd54c0b83b44dd4c

    • SHA512

      45e97242c178b32ac842c92859f1d6c9415022e74cdb2275d8a8bb3b63d7e0d1b207791f0eec176554e0dcebebbf1838d83d905cea7eea501148b6189e54970b

    • SSDEEP

      12288:UyK5t4FM6X3f+B9h2+YEIBAHf267Ir6l4rAKeMb5LCeODyKUqDni:Uz9E+YEIY2pelSfcxUqLi

    Score
    9/10
    • Detects executables containing SQL queries to confidential data stores. Observed in infostealers

    • Detects executables containing possible sandbox analysis VM usernames

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks