Static task
static1
Behavioral task
behavioral1
Sample
2024-03-09_1d132f29c8282aeb4bdd6ecff479297a_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-09_1d132f29c8282aeb4bdd6ecff479297a_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-09_1d132f29c8282aeb4bdd6ecff479297a_icedid
-
Size
1.8MB
-
MD5
1d132f29c8282aeb4bdd6ecff479297a
-
SHA1
898725ae24a8947361a41b59d43f26ef7c291734
-
SHA256
391b6de77bd3746d7b3c78d1fad5e3bb289fd2d4eba934ca475468fbf6f69333
-
SHA512
a4db69c59dc221027932a172566ccd190cdc55fdcda759068c73f80c4e3dc70652fd793c6cdcce79e0956261b77d8ce6b105bab3007a81aa02dabfdf1a374eef
-
SSDEEP
24576:vsfdIUQIs68Li0v97Y8VDc7GQNrSrf39gWW5Asj6lVo:vslz8j97Sa0Sj39u6Vo
Malware Config
Signatures
-
Detects executables packed with Enigma 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_Enigma -
Detects packed executables observed in Molerats 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_Loader -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-09_1d132f29c8282aeb4bdd6ecff479297a_icedid
Files
-
2024-03-09_1d132f29c8282aeb4bdd6ecff479297a_icedid.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 684KB - Virtual size: 680KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 144KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 496KB - Virtual size: 496KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.enigma1 Size: 124KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.enigma2 Size: 284KB - Virtual size: 284KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE