General
-
Target
2024-04-05_77ec791818fa2178f83c8b2be17d94ec_icedid_xrat
-
Size
4.7MB
-
Sample
240405-a2ezvafa9v
-
MD5
77ec791818fa2178f83c8b2be17d94ec
-
SHA1
283b1a74d058c21ee9d7fb2c145506bf8d67fc77
-
SHA256
292c186067e3b02d96199bce055b58e873f34411ae86e987639051a7f4910ab9
-
SHA512
963322a8ff2cbeaa50ca42a6e6b3d9791df8c82b6bf29ebe683432abac22ec56fbed424e88de976c3c78db083ed361406b48dd1ab48c9e322624e287b836ad8e
-
SSDEEP
98304:2hKnRcfjYvr22SsaNYfdPBldt6+dBcjHtKRJ6B+IbzZQIbzZY:tLM7jGItBK
Behavioral task
behavioral1
Sample
2024-04-05_77ec791818fa2178f83c8b2be17d94ec_icedid_xrat.exe
Resource
win7-20240221-en
Malware Config
Extracted
quasar
1.4.1
Office04
mx5.deitie.asia:4495
ebbf737a-dddd-43dd-9b0a-74831302455d
-
encryption_key
F8516D89A1DFD78BD8FF575BBC3AE828B47FF0E1
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
2024-04-05_77ec791818fa2178f83c8b2be17d94ec_icedid_xrat
-
Size
4.7MB
-
MD5
77ec791818fa2178f83c8b2be17d94ec
-
SHA1
283b1a74d058c21ee9d7fb2c145506bf8d67fc77
-
SHA256
292c186067e3b02d96199bce055b58e873f34411ae86e987639051a7f4910ab9
-
SHA512
963322a8ff2cbeaa50ca42a6e6b3d9791df8c82b6bf29ebe683432abac22ec56fbed424e88de976c3c78db083ed361406b48dd1ab48c9e322624e287b836ad8e
-
SSDEEP
98304:2hKnRcfjYvr22SsaNYfdPBldt6+dBcjHtKRJ6B+IbzZQIbzZY:tLM7jGItBK
-
Quasar payload
-
Detects Windows executables referencing non-Windows User-Agents
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-