General

  • Target

    2024-05-20_2409e0642f2d5a1e13939c7e82ce62c2_icedid

  • Size

    12.1MB

  • MD5

    2409e0642f2d5a1e13939c7e82ce62c2

  • SHA1

    ee18a9c4cf6a3856c7a926095d9d606b6b772b07

  • SHA256

    deb838a647fcd40f3de21709f27265fdb9e8e235d2c7a4c60c6ead7af0c7ecda

  • SHA512

    fa1fc09518d5ddcb623b6302088996e05c1ef29170c20beec406c4a7a21d6881d74f001b684071baa71805a644eb993098b788bff1b0d09b28ac0c0f05b08f5a

  • SSDEEP

    393216:UlbCQ6vgggygggDXgggCgggcggggggPgggCgggUXgggegggtggggtgggrggggJXW:xQmgggygggDXgggCgggcggggggPgggCG

Score
10/10

Malware Config

Signatures

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 1 IoCs

Files

  • 2024-05-20_2409e0642f2d5a1e13939c7e82ce62c2_icedid
    .exe windows:6 windows x86 arch:x86

    0e6fd1a61cbe87fd70e2bfb300faba39


    Code Sign

    Headers

    Imports

    Sections