General
-
Target
2024-03-27_c6a040b09d26b27b4b2e042765009868_icedid
-
Size
2.0MB
-
Sample
240327-wbtwzacf3s
-
MD5
c6a040b09d26b27b4b2e042765009868
-
SHA1
69e0aa95fdf46a52726fd0e35af5f2eca3dd7867
-
SHA256
655fa8e045bafdd00e4e00193be6fefbd62a44e09c11b729e34497feb6e274ea
-
SHA512
479572d5f5016d66a644f817225a98f501284ba3b39d185532c67d025fe03e2cd432573ca980133f232d5cba10a503d5df33c5afbb92b31af5b7f8e913674204
-
SSDEEP
49152:KnsHyjtk2MYC5GD8Tq24GjdGS9hWb2J3Y2pzEBOgpjoVuQr:Knsmtk2aAEjdGSGb2Jo2Dxr
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-27_c6a040b09d26b27b4b2e042765009868_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-27_c6a040b09d26b27b4b2e042765009868_icedid.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Targets
-
-
Target
2024-03-27_c6a040b09d26b27b4b2e042765009868_icedid
-
Size
2.0MB
-
MD5
c6a040b09d26b27b4b2e042765009868
-
SHA1
69e0aa95fdf46a52726fd0e35af5f2eca3dd7867
-
SHA256
655fa8e045bafdd00e4e00193be6fefbd62a44e09c11b729e34497feb6e274ea
-
SHA512
479572d5f5016d66a644f817225a98f501284ba3b39d185532c67d025fe03e2cd432573ca980133f232d5cba10a503d5df33c5afbb92b31af5b7f8e913674204
-
SSDEEP
49152:KnsHyjtk2MYC5GD8Tq24GjdGS9hWb2J3Y2pzEBOgpjoVuQr:Knsmtk2aAEjdGSGb2Jo2Dxr
Score10/10-
Xred family
-
Detects Windows executables referencing non-Windows User-Agents
-
Detects executables Discord URL observed in first stage droppers
-
Detects executables manipulated with Fody
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-