General

  • Target

    2024-04-24_414f2335ced597f8a3af61124f8b2e34_icedid

  • Size

    721KB

  • Sample

    240424-aw3tqadb68

  • MD5

    414f2335ced597f8a3af61124f8b2e34

  • SHA1

    cb63fc99d1b4ebc17f671b4801ee662f90074142

  • SHA256

    5f293e98ffc282192341df950f56e105eccf2787bb7f506e02bdb63d86a9fbef

  • SHA512

    929719017c73ee47722411dfcdcca4cb8050d7af06bf945d045696a0bdee8d8564225cf7b31bf1272bdc21496ebe1553c13cd23f77b06a5db423a93dbdd801d1

  • SSDEEP

    12288:nYMZZ0xAUiX3+Zr3QDKaeOHJSko26oDOIcTvtI8+GJijTCGC6najpVliDydWfk:nJ2EKBkJC2xOIGvtIC8CGCKcTl7

Score
9/10

Malware Config

Targets

    • Target

      2024-04-24_414f2335ced597f8a3af61124f8b2e34_icedid

    • Size

      721KB

    • MD5

      414f2335ced597f8a3af61124f8b2e34

    • SHA1

      cb63fc99d1b4ebc17f671b4801ee662f90074142

    • SHA256

      5f293e98ffc282192341df950f56e105eccf2787bb7f506e02bdb63d86a9fbef

    • SHA512

      929719017c73ee47722411dfcdcca4cb8050d7af06bf945d045696a0bdee8d8564225cf7b31bf1272bdc21496ebe1553c13cd23f77b06a5db423a93dbdd801d1

    • SSDEEP

      12288:nYMZZ0xAUiX3+Zr3QDKaeOHJSko26oDOIcTvtI8+GJijTCGC6najpVliDydWfk:nJ2EKBkJC2xOIGvtIC8CGCKcTl7

    Score
    9/10
    • Detects executables containing SQL queries to confidential data stores. Observed in infostealers

    • Detects executables containing possible sandbox analysis VM usernames

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks