General

  • Target

    2024-04-26_65101ca439af15d788f6bd289fa1d09d_icedid

  • Size

    720KB

  • Sample

    240426-a6vwvsge41

  • MD5

    65101ca439af15d788f6bd289fa1d09d

  • SHA1

    fde71a4562f7d9187343b59e7a656ab9ad03e12d

  • SHA256

    dca99fe49af49ca6bd009566176fcc2709ac8971aba08a72b6e9bcab86c2136a

  • SHA512

    3fae3d603547c7a6a0e017f6be82e79067d3e48aa0ea9ef82763d068118c346ca43f1c838a7b543662349a8325994ab2bb4b30b571f810989c6107f088649d1c

  • SSDEEP

    12288:h8l/J6su8OX31+NvcUUfGENKx26oCmFeGXhrUugDbWQBhKOnYGDh5nMN:h8lznrUfG52EmF91yWshKTwvny

Score
9/10

Malware Config

Targets

    • Target

      2024-04-26_65101ca439af15d788f6bd289fa1d09d_icedid

    • Size

      720KB

    • MD5

      65101ca439af15d788f6bd289fa1d09d

    • SHA1

      fde71a4562f7d9187343b59e7a656ab9ad03e12d

    • SHA256

      dca99fe49af49ca6bd009566176fcc2709ac8971aba08a72b6e9bcab86c2136a

    • SHA512

      3fae3d603547c7a6a0e017f6be82e79067d3e48aa0ea9ef82763d068118c346ca43f1c838a7b543662349a8325994ab2bb4b30b571f810989c6107f088649d1c

    • SSDEEP

      12288:h8l/J6su8OX31+NvcUUfGENKx26oCmFeGXhrUugDbWQBhKOnYGDh5nMN:h8lznrUfG52EmF91yWshKTwvny

    Score
    9/10
    • Detects executables containing SQL queries to confidential data stores. Observed in infostealers

    • Detects executables containing possible sandbox analysis VM usernames

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks