General

  • Target

    2024-04-22_b6f59201751b3a73de4139c0fe055500_icedid

  • Size

    3.9MB

  • MD5

    b6f59201751b3a73de4139c0fe055500

  • SHA1

    f0c346edf4a2e51bb39be2d57edec66bc68fce6f

  • SHA256

    9af5db571671ea199129a8fdc6cb51217e7656b776be9f60402ef01085e289bb

  • SHA512

    74266bf6840984a3cc3f0384c19048fc16a716ea27141f1d0c955778825122e4617842e656d117edee666a4c6362f7bde0cd7662971cee8c8e205220606297ec

  • SSDEEP

    49152:ZEXGeBsHHSdorG9xgX3oICanZCWKiM1nOn6ckEo3D0PPoe9D1sf8g:ZEWmWrGsX3oxQZjM1nOnS3D0PAaY8g

Score
10/10

Malware Config

Signatures

  • Detect Lumma Stealer payload V4 1 IoCs
  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
  • Lumma family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_b6f59201751b3a73de4139c0fe055500_icedid
    .exe windows:4 windows x86 arch:x86

    bb5b5ba3e1eed749630702b2141a1cd0


    Headers

    Imports

    Sections