Behavioral task
behavioral1
Sample
2024-05-24_47cf857b24c72a1bba3c55e7ed8e6924_icedid.exe
Resource
win7-20240215-en
General
-
Target
2024-05-24_47cf857b24c72a1bba3c55e7ed8e6924_icedid
-
Size
8.6MB
-
MD5
47cf857b24c72a1bba3c55e7ed8e6924
-
SHA1
2a3a77793d4671d93861cd069d0919cedadc2d6e
-
SHA256
b51b2e8c45fa3fb71adcca4de3011a6333abf798a6cb9a6e55c218b648f40495
-
SHA512
cf329e2d3459d4add3459971c3ee35a9bfafdaafb3eff60be29f3db4dacc88f951d6fe24f26d00ed0f81e424b52b78120aea4467f0c25a2aa0550000d997cafb
-
SSDEEP
98304:ol9oLCqqJvb+0CAds6uipFNIhgWteZGHo2bjocPew1yC/LOCQN0odU46UB:4ds6WHt2GI6jocPeXC/SiUF
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule sample family_blackmoon -
Detects executables packed with ASPack 1 IoCs
Processes:
resource yara_rule sample INDICATOR_EXE_Packed_ASPack -
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule sample UPX -
Processes:
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-05-24_47cf857b24c72a1bba3c55e7ed8e6924_icedid
Files
-
2024-05-24_47cf857b24c72a1bba3c55e7ed8e6924_icedid.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 422KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8.1MB - Virtual size: 13.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 592KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE