General
-
Target
2025-01-30_aa8e460de6485d0f5fe7bee87eab208e_icedid_luca-stealer
-
Size
3.4MB
-
Sample
250130-1allesvpgq
-
MD5
aa8e460de6485d0f5fe7bee87eab208e
-
SHA1
db53b87503cc1b45d87095d3bfb462a23f9061c0
-
SHA256
dc56e5df5c580fe7a54f5da41518712ddc001b4aeed229bf9add3f4ed9732416
-
SHA512
9cb5cc05afd11d3d42a0be34f4933dce9dae7961dd7c9b437b9a4ba2e73b711d7973f2a4c276a417f8a102ff5d66bbf0741c3ee432f6eb09850b003068b7f35c
-
SSDEEP
98304:MNUI/8Du7EEKHvWqtxbwhwAjyKwmtv7r57dNSeJ:MNUK7nKHvjzQbyKwmd7F7LS8
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-30_aa8e460de6485d0f5fe7bee87eab208e_icedid_luca-stealer.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-01-30_aa8e460de6485d0f5fe7bee87eab208e_icedid_luca-stealer.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
asyncrat
1.0.7
FENIX
85.31.47.59:8848
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
2025-01-30_aa8e460de6485d0f5fe7bee87eab208e_icedid_luca-stealer
-
Size
3.4MB
-
MD5
aa8e460de6485d0f5fe7bee87eab208e
-
SHA1
db53b87503cc1b45d87095d3bfb462a23f9061c0
-
SHA256
dc56e5df5c580fe7a54f5da41518712ddc001b4aeed229bf9add3f4ed9732416
-
SHA512
9cb5cc05afd11d3d42a0be34f4933dce9dae7961dd7c9b437b9a4ba2e73b711d7973f2a4c276a417f8a102ff5d66bbf0741c3ee432f6eb09850b003068b7f35c
-
SSDEEP
98304:MNUI/8Du7EEKHvWqtxbwhwAjyKwmtv7r57dNSeJ:MNUK7nKHvjzQbyKwmd7F7LS8
Score10/10-
Asyncrat family
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-