General

  • Target

    2024-06-16_b4da69f06eaca2b9f41fff9c783ce170_icedid

  • Size

    3.7MB

  • MD5

    b4da69f06eaca2b9f41fff9c783ce170

  • SHA1

    bf3c10402bc30aaa046010c8d1c06776d66c9728

  • SHA256

    abcdc861d0d807360cc7948d33bf568bfe891c3ea8610f0d2e2ca8396938ac17

  • SHA512

    58b70e7cae84187dda6f16b46aae03d8ad647100214997f7745969d8c304540ae2205e93bfc87d370b6f6d9d83e496096106ed417b5d8db7e1e60a8a167b236e

  • SSDEEP

    98304:xviPBQN51huPl1ywyPaG16EPfXWr/vmqk8ao:x65Ql+GRXWr/bF

Score
10/10

Malware Config

Signatures

  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs

Files

  • 2024-06-16_b4da69f06eaca2b9f41fff9c783ce170_icedid
    .exe windows:4 windows x86 arch:x86

    0241d06196d8fa27780716b8ceddad9e


    Code Sign

    Headers

    Imports

    Sections