General
-
Target
2024-03-27_890ccdd953ad624f557516c5f94ef5ec_icedid
-
Size
2.0MB
-
Sample
240327-w3pfkahg49
-
MD5
890ccdd953ad624f557516c5f94ef5ec
-
SHA1
0137cd95c0cfbb4ea2659253b13f781a980914c0
-
SHA256
d61b83ccbe8a440efc227f483a6a67000d7fb671b4c38227a2068fa4e5528e23
-
SHA512
c7ce61f6ebb9b77d0ea5e63be869b9528e34d3c8add9ee34464d1f8f12b7f8a92d9a27fe3d3bbe70d680040f0fab909efdfb7e3e72425db2390d96c80616b11a
-
SSDEEP
49152:vnsHyjtk2MYC5GDuTq24GjdGS9hWb2J3Y2p9tGk5fA:vnsmtk2aeEjdGSGb2Jo2b75fA
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-27_890ccdd953ad624f557516c5f94ef5ec_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-27_890ccdd953ad624f557516c5f94ef5ec_icedid.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-03-27_890ccdd953ad624f557516c5f94ef5ec_icedid
-
Size
2.0MB
-
MD5
890ccdd953ad624f557516c5f94ef5ec
-
SHA1
0137cd95c0cfbb4ea2659253b13f781a980914c0
-
SHA256
d61b83ccbe8a440efc227f483a6a67000d7fb671b4c38227a2068fa4e5528e23
-
SHA512
c7ce61f6ebb9b77d0ea5e63be869b9528e34d3c8add9ee34464d1f8f12b7f8a92d9a27fe3d3bbe70d680040f0fab909efdfb7e3e72425db2390d96c80616b11a
-
SSDEEP
49152:vnsHyjtk2MYC5GDuTq24GjdGS9hWb2J3Y2p9tGk5fA:vnsmtk2aeEjdGSGb2Jo2b75fA
Score9/10-
Detects Windows executables referencing non-Windows User-Agents
-
Detects executables (downlaoders) containing URLs to raw contents of a paste
-
Detects executables Discord URL observed in first stage droppers
-
Detects executables manipulated with Fody
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-