G:\Backup\projects\Visual Studio .Net Projects\GetVideosForTVShows\obj\x86\Debug\GetVideosForTVShows.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-13_2d2b6b67c0d8e2f56c791c7d55070f4d_icedid.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-13_2d2b6b67c0d8e2f56c791c7d55070f4d_icedid.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-13_2d2b6b67c0d8e2f56c791c7d55070f4d_icedid
-
Size
247KB
-
MD5
2d2b6b67c0d8e2f56c791c7d55070f4d
-
SHA1
2efbdfa0f9736e29ddf8d61e8fbfd43f6c5891c7
-
SHA256
0457cfaf2263ca876ff4c3221048772d0913a3f58e099b4313b961aff9b1fc39
-
SHA512
fe55cb9461205975f707c45bf8c1c64044f70c422d5fd7b8b72d0784a1136e20d4379cbc2c1cb3657cb77cdfbf84644b53d9db24bfb5e9e4cb89b5df92d202af
-
SSDEEP
3072:vAQrwOrxRY4xWQ5llOi9NO7EUpEx+G9bUCJFMNXWwSFVFtF7qXjqXJqoySivSh6j:vAQrwKNxWqllOiU7EUG9brHfGXOXkoV
Malware Config
Signatures
-
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-13_2d2b6b67c0d8e2f56c791c7d55070f4d_icedid
Files
-
2024-06-13_2d2b6b67c0d8e2f56c791c7d55070f4d_icedid.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 244KB - Virtual size: 243KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ