General
-
Target
2024-03-05_e8ebd7371423674eeaf3096be663bed8_hacktools_icedid
-
Size
10.7MB
-
Sample
240305-p85w6sgc69
-
MD5
e8ebd7371423674eeaf3096be663bed8
-
SHA1
31ea5b998f973e7d218ab21797a35d3b3a3ca6aa
-
SHA256
af0354685eed6dc6a81df1d9f7f0049e0318a0cb13c7e3b33db816531b4c03ef
-
SHA512
362fe78da19bed48d84ad13b1d0051dfd93d7647a5342a074646df22c143597734f2446787007aa5cf5156ce85da01351651b1ae094afbaa8bc20f4e013da36d
-
SSDEEP
196608:k4ejnJcDKlFBqZcPzFwDxURK8vyqByLdlf3hRQIgLKND3JAD9:6ODKlFBqauayOclfhRQIG2D3uh
Behavioral task
behavioral1
Sample
2024-03-05_e8ebd7371423674eeaf3096be663bed8_hacktools_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-05_e8ebd7371423674eeaf3096be663bed8_hacktools_icedid.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-05_e8ebd7371423674eeaf3096be663bed8_hacktools_icedid
-
Size
10.7MB
-
MD5
e8ebd7371423674eeaf3096be663bed8
-
SHA1
31ea5b998f973e7d218ab21797a35d3b3a3ca6aa
-
SHA256
af0354685eed6dc6a81df1d9f7f0049e0318a0cb13c7e3b33db816531b4c03ef
-
SHA512
362fe78da19bed48d84ad13b1d0051dfd93d7647a5342a074646df22c143597734f2446787007aa5cf5156ce85da01351651b1ae094afbaa8bc20f4e013da36d
-
SSDEEP
196608:k4ejnJcDKlFBqZcPzFwDxURK8vyqByLdlf3hRQIgLKND3JAD9:6ODKlFBqauayOclfhRQIG2D3uh
-
Detect Blackmoon payload
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload
-
Detects executables packed with VMProtect.
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-