General

  • Target

    2024-05-20_1d9d2e901e69004f8e818ddd5ed6da9d_icedid

  • Size

    3.7MB

  • MD5

    1d9d2e901e69004f8e818ddd5ed6da9d

  • SHA1

    7700e56a7c5fd76b825c6d9b7769d3c34e35e2f6

  • SHA256

    492e55c467a974e2afe24ebbf4d6785c5c22e8e6010d630afd6f687630fb26e4

  • SHA512

    13e4e9720dbf7f2e655a2a46211197d7488f804346f5799ea052814b004d8cf37c8fd35885eecf333e8f2ccf4757e3f7c641a9a2d69de8c508d367b498624cdb

  • SSDEEP

    49152:+F8uJAwa2iMIeESAz9oDhdfaxncTniDJYMqauqHene4syW1ywpdQ3zF9P/tW17nf:qNNWMFTrau9ep1ywfkF9PFUb8Tk

Score
10/10

Malware Config

Signatures

  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs

Files

  • 2024-05-20_1d9d2e901e69004f8e818ddd5ed6da9d_icedid
    .exe windows:4 windows x86 arch:x86

    0c79d96d0d06ad0db70883de3eb6c69b


    Code Sign

    Headers

    Imports

    Sections