General
-
Target
2024-05-24_8eafe69397ffcda34417d17d6116e231_icedid
-
Size
32.6MB
-
Sample
240524-fnslnsed38
-
MD5
8eafe69397ffcda34417d17d6116e231
-
SHA1
974727c9f19cf4d8177b57737815cdc841417533
-
SHA256
d9f9c1dbbcaea31fa5e016bf1c0849ab83a4facea3db59826259bfe6d1b88ae1
-
SHA512
d64b69c6c434b1f7180d67fdc1f13bc2347cd4d1a054899ec15c6b6ea911c9a00b2aefc9ac197afcb3aa3e095fc7d4399bb8ae67d049a1a073513dc182153825
-
SSDEEP
786432:FA+sxpo5ptL4n1SWUXnxL++CWvPX1fXcMhvY7L3NX/2cOC7ojRqZ:3Lx4nVgMuHX1fXDh6pXecOCgRk
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_8eafe69397ffcda34417d17d6116e231_icedid.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
2024-05-24_8eafe69397ffcda34417d17d6116e231_icedid
-
Size
32.6MB
-
MD5
8eafe69397ffcda34417d17d6116e231
-
SHA1
974727c9f19cf4d8177b57737815cdc841417533
-
SHA256
d9f9c1dbbcaea31fa5e016bf1c0849ab83a4facea3db59826259bfe6d1b88ae1
-
SHA512
d64b69c6c434b1f7180d67fdc1f13bc2347cd4d1a054899ec15c6b6ea911c9a00b2aefc9ac197afcb3aa3e095fc7d4399bb8ae67d049a1a073513dc182153825
-
SSDEEP
786432:FA+sxpo5ptL4n1SWUXnxL++CWvPX1fXcMhvY7L3NX/2cOC7ojRqZ:3Lx4nVgMuHX1fXDh6pXecOCgRk
-
Modifies firewall policy service
-
Blocklisted process makes network request
-
Adds Run key to start application
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Privilege Escalation
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Modify Registry
4Impair Defenses
1Disable or Modify System Firewall
1Subvert Trust Controls
1Install Root Certificate
1