t:\FtpServer_Other\2Release\FTPServer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-20_6f4420b1f21121e55e39dc6711a7c6cd_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-20_6f4420b1f21121e55e39dc6711a7c6cd_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-20_6f4420b1f21121e55e39dc6711a7c6cd_icedid
-
Size
2.0MB
-
MD5
6f4420b1f21121e55e39dc6711a7c6cd
-
SHA1
00790117de7c0092774289fdeb6fc764f133321d
-
SHA256
49879330a5969e79f9bbb9c89c86990b8df6e84d4ec6376af1eba897be60ba4b
-
SHA512
68fef23dc7f8b7bc3ef40394c4cdec7cfa0a0eb83f982854903079dae279312c66833936569433b29061d7e4cd8f34be7356ba1d0cfac811a55d42aed48fd4ed
-
SSDEEP
12288:muCN4ul1024Rg31VszHUTQy6jHOjK/PYk5:bRul624RgbsbUTQ/jHO+PYk5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-20_6f4420b1f21121e55e39dc6711a7c6cd_icedid
Files
-
2024-02-20_6f4420b1f21121e55e39dc6711a7c6cd_icedid.exe windows:5 windows x86 arch:x86
15dae2b9237aecac92ae12be6b9bae43
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCPInfo
GetOEMCP
SetErrorMode
GetCurrentDirectoryA
HeapFree
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetTimeFormatA
GetDateFormatA
ExitProcess
HeapAlloc
GetCommandLineA
GetStartupInfoA
RtlUnwind
HeapReAlloc
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitThread
CreateThread
HeapSize
HeapCreate
VirtualFree
TlsFree
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStdHandle
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetDriveTypeA
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
InterlockedIncrement
GetModuleHandleW
GlobalFlags
InterlockedDecrement
GetModuleFileNameW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
FindFirstFileA
FindNextFileA
FindClose
GetFileTime
GetFileSizeEx
CreateFileA
GetFileAttributesExA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentProcessId
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
CloseHandle
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
FreeLibrary
lstrcmpW
GetVersionExA
GlobalAlloc
FormatMessageA
LocalFree
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
CreateDirectoryA
GetLocalTime
lstrcatA
lstrcpyA
lstrlenA
MultiByteToWideChar
lstrcpynA
GetProcAddress
GetModuleHandleA
LoadLibraryA
GetLastError
SetLastError
ResumeThread
SetThreadPriority
DeleteCriticalSection
LeaveCriticalSection
InitializeCriticalSection
MulDiv
Sleep
GetFileAttributesA
GetTickCount
RemoveDirectoryA
DeleteFileA
EnterCriticalSection
GetPrivateProfileStringA
GetPrivateProfileIntA
WritePrivateProfileStringA
GetModuleFileNameA
FindResourceA
LoadResource
LockResource
SizeofResource
GetACP
WideCharToMultiByte
user32
MessageBeep
UnregisterClassA
SetCursor
SetWindowContextHelpId
MapDialogRect
RegisterClipboardFormatA
PostQuitMessage
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
CharUpperA
GetWindowThreadProcessId
WaitMessage
GetMessageA
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
CheckMenuItem
RegisterWindowMessageA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
GetNextDlgGroupItem
TrackPopupMenu
GetKeyState
SetMenu
IsWindowVisible
UpdateWindow
MessageBoxA
CreateWindowExA
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
EqualRect
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetFocus
ShowWindow
MoveWindow
SetWindowLongA
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SendDlgItemMessageA
GetWindowTextLengthA
GetWindowTextA
GetWindow
SetFocus
GetMenuState
GetMenuItemID
GetMenuItemCount
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
ReleaseCapture
SetCapture
LoadCursorA
IsWindowEnabled
GetParent
GetSysColorBrush
DestroyMenu
WindowFromPoint
GetNextDlgTabItem
EndDialog
SetForegroundWindow
GetCursorPos
MsgWaitForMultipleObjects
TranslateMessage
PeekMessageA
DispatchMessageA
GetSubMenu
LoadMenuA
EnableMenuItem
SetWindowPos
GetDlgCtrlID
DestroyIcon
LoadImageA
DrawFocusRect
GetSystemMetrics
InflateRect
OffsetRect
DrawStateA
CopyRect
DrawFrameControl
GetSysColor
WinHelpA
LoadIconA
KillTimer
RedrawWindow
InvalidateRect
GetWindowRect
GetDlgItem
IsWindow
GetClientRect
wsprintfA
PostMessageA
SetTimer
PostThreadMessageA
SendMessageA
EnableWindow
GetClassInfoA
gdi32
DeleteDC
GetStockObject
ExtTextOutA
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
CreateRectRgnIndirect
ExtSelectClipRgn
TextOutA
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
DeleteObject
GetWindowExtEx
GetViewportExtEx
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
Escape
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegEnumKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
shell32
SHGetMalloc
SHGetPathFromIDListA
Shell_NotifyIconA
SHBrowseForFolderA
comctl32
InitCommonControlsEx
shlwapi
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
oledlg
ord8
ole32
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemAlloc
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoTaskMemFree
oleaut32
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringByteLen
SysFreeString
SysStringLen
wsock32
socket
select
gethostbyname
htonl
htons
ioctlsocket
bind
getsockname
getpeername
accept
connect
sendto
recvfrom
WSAAsyncSelect
send
recv
shutdown
listen
WSAGetLastError
closesocket
WSACleanup
WSASetLastError
inet_addr
ntohs
WSAStartup
Sections
.text Size: 286KB - Virtual size: 286KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE