General

  • Target

    2024-06-28_95b71f1e434be97a39998f49d32da40b_icedid_poet-rat_quasar-rat_xrat

  • Size

    4.9MB

  • MD5

    95b71f1e434be97a39998f49d32da40b

  • SHA1

    ada21f3db506e3abb079b8cfb8c51a8924de2ed9

  • SHA256

    1ae218c37667a4a96d4ce7e19b19a5a56fa17b112f3bf6e94e78671ad6077168

  • SHA512

    c22511b254d29d22ea444cdf56ab9bb32a0e4d00c81b2d5e63a9394009ea7d4b747bc28a96cb845b62d998e91c3bcdf4f7e2dbaabc3f7dcdc92947b98c7e2559

  • SSDEEP

    98304:2uhNyndYGvr22SsaNYfdPBldt6+dBcjHtKRJ6B6IbzZLRIbzZY:5cM7jGIRp+K

Score
10/10

Malware Config

Signatures

  • Detects Windows executables referencing non-Windows User-Agents 1 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables containing common artifacts observed in infostealers 1 IoCs
  • Quasar family
  • Quasar payload 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-28_95b71f1e434be97a39998f49d32da40b_icedid_poet-rat_quasar-rat_xrat
    .exe windows:4 windows x86 arch:x86

    b256d5fb0c7001cb50ccf5d0f67b1c83


    Headers

    Imports

    Sections