General
-
Target
2024-09-06_58a3b83be61a3c930c9f4ba60e034bfa_icedid
-
Size
11.5MB
-
Sample
240906-lvyn6azeqe
-
MD5
58a3b83be61a3c930c9f4ba60e034bfa
-
SHA1
059ad7e7ae120410a3006771cb8c9dd569c02bbe
-
SHA256
7fda537639322e817fce5d10ae594f1b249e7e4b19879cf5172a792ad2b44a62
-
SHA512
301a35a68ff00523efc75f57fc8d7db02df055040570e0ecddd0d433bf0c987b1d81456cfbc1ebd5cac8ff3d2bf61808f8bc26d7ea53c17d79170a2016d62f5a
-
SSDEEP
196608:pvhHizhaa8zmBbY4W6rUtlHX/M1uEfrHJRES4NQn7z9fdaOK2IyRPf59dn:Ua9zf4WfHX/Eu2rHJRELQVVLXIyBfjdn
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-06_58a3b83be61a3c930c9f4ba60e034bfa_icedid.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-06_58a3b83be61a3c930c9f4ba60e034bfa_icedid.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2024-09-06_58a3b83be61a3c930c9f4ba60e034bfa_icedid
-
Size
11.5MB
-
MD5
58a3b83be61a3c930c9f4ba60e034bfa
-
SHA1
059ad7e7ae120410a3006771cb8c9dd569c02bbe
-
SHA256
7fda537639322e817fce5d10ae594f1b249e7e4b19879cf5172a792ad2b44a62
-
SHA512
301a35a68ff00523efc75f57fc8d7db02df055040570e0ecddd0d433bf0c987b1d81456cfbc1ebd5cac8ff3d2bf61808f8bc26d7ea53c17d79170a2016d62f5a
-
SSDEEP
196608:pvhHizhaa8zmBbY4W6rUtlHX/M1uEfrHJRES4NQn7z9fdaOK2IyRPf59dn:Ua9zf4WfHX/Eu2rHJRELQVVLXIyBfjdn
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Pre-OS Boot
1Bootkit
1