General
-
Target
2024-03-18_8a9e5085b2ddde4bb392ac33c74849bb_icedid
-
Size
2.8MB
-
Sample
240318-p18yvshb28
-
MD5
8a9e5085b2ddde4bb392ac33c74849bb
-
SHA1
51057e7da843bc77297a323b73264b75514f0624
-
SHA256
de1a167d7cc0d63d740a02b9d78a2f641c52c3a83386ce238a6e23cae2e5939a
-
SHA512
35d5aeb9a87225df93cc5f68e3041fedacd92ce67119921184029180578cd3ccf3cd091749a49c4673d68536cdd011a8aa758c2f6ab10f037899e802f20261fc
-
SSDEEP
49152:yCwsbCANnKXferL7Vwe/Gg0P+WhMC/yGol:Vws2ANnKXOaeOgmh7/Lol
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-18_8a9e5085b2ddde4bb392ac33c74849bb_icedid.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
2024-03-18_8a9e5085b2ddde4bb392ac33c74849bb_icedid
-
Size
2.8MB
-
MD5
8a9e5085b2ddde4bb392ac33c74849bb
-
SHA1
51057e7da843bc77297a323b73264b75514f0624
-
SHA256
de1a167d7cc0d63d740a02b9d78a2f641c52c3a83386ce238a6e23cae2e5939a
-
SHA512
35d5aeb9a87225df93cc5f68e3041fedacd92ce67119921184029180578cd3ccf3cd091749a49c4673d68536cdd011a8aa758c2f6ab10f037899e802f20261fc
-
SSDEEP
49152:yCwsbCANnKXferL7Vwe/Gg0P+WhMC/yGol:Vws2ANnKXOaeOgmh7/Lol
-
Gh0st RAT payload
-
UPX dump on OEP (original entry point)
-
Drops file in Drivers directory
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-