General

  • Target

    2024-04-18_7cce2ca74a8b4b2f6ba963a0567b74dd_icedid

  • Size

    713KB

  • Sample

    240418-yscecseg2s

  • MD5

    7cce2ca74a8b4b2f6ba963a0567b74dd

  • SHA1

    716f78c945c23a43027c9e3fa6b7daaeab3ca7cf

  • SHA256

    0ddfcd9f8b879e612c25ec2474cb4fc6d820b76a9585ff840789fad32bd690c2

  • SHA512

    0aa20d822b642b8383fefa9bb5510ef0403cbb4af4d07701bf53b81e048fe9f75b883ac49a24b92c30483ec86da31b5cd755c1d4f483a108a7022dccb6128ded

  • SSDEEP

    12288:UjHFEdlULc3NX3SZKM0uJZc0RyzQc+26oMCcUi1WEUldLVatSgVoRebI:U72g5bc0L2uCDLk8R

Score
9/10

Malware Config

Targets

    • Target

      2024-04-18_7cce2ca74a8b4b2f6ba963a0567b74dd_icedid

    • Size

      713KB

    • MD5

      7cce2ca74a8b4b2f6ba963a0567b74dd

    • SHA1

      716f78c945c23a43027c9e3fa6b7daaeab3ca7cf

    • SHA256

      0ddfcd9f8b879e612c25ec2474cb4fc6d820b76a9585ff840789fad32bd690c2

    • SHA512

      0aa20d822b642b8383fefa9bb5510ef0403cbb4af4d07701bf53b81e048fe9f75b883ac49a24b92c30483ec86da31b5cd755c1d4f483a108a7022dccb6128ded

    • SSDEEP

      12288:UjHFEdlULc3NX3SZKM0uJZc0RyzQc+26oMCcUi1WEUldLVatSgVoRebI:U72g5bc0L2uCDLk8R

    Score
    9/10
    • Detects executables containing SQL queries to confidential data stores. Observed in infostealers

    • Detects executables containing possible sandbox analysis VM usernames

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks