General

  • Target

    2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnit

  • Size

    592KB

  • Sample

    240926-a1l2rsxakm

  • MD5

    c5e8350dca8ec1ac3db0e4af9b4df289

  • SHA1

    e746f6e659cb794549b82c922d0ba3f289dd67c5

  • SHA256

    34684017d19d2f7b106da522a22f34bb55848808213f8b25b9acb1d174e9e32d

  • SHA512

    4866acffd0ee956e4f793feaf20fb08eb366fdbcc533c305ef3679741851153525334c6182343ec523ec9ab60cbf499bb032f0c6bcf870e6dade4377bed16c4d

  • SSDEEP

    6144:yfqGm/TYtUcxGDaFIJyYLBDCzAUtpvhM1sdLhtloVWNV6a0hsp:yC5/M6uGW0ybnviaKYNVusp

Malware Config

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Targets

    • Target

      2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnit

    • Size

      592KB

    • MD5

      c5e8350dca8ec1ac3db0e4af9b4df289

    • SHA1

      e746f6e659cb794549b82c922d0ba3f289dd67c5

    • SHA256

      34684017d19d2f7b106da522a22f34bb55848808213f8b25b9acb1d174e9e32d

    • SHA512

      4866acffd0ee956e4f793feaf20fb08eb366fdbcc533c305ef3679741851153525334c6182343ec523ec9ab60cbf499bb032f0c6bcf870e6dade4377bed16c4d

    • SSDEEP

      6144:yfqGm/TYtUcxGDaFIJyYLBDCzAUtpvhM1sdLhtloVWNV6a0hsp:yC5/M6uGW0ybnviaKYNVusp

    • Bdaejec

      Bdaejec is a backdoor written in C++.

    • Detects Bdaejec Backdoor.

      Bdaejec is backdoor written in C++.

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks