General
-
Target
2025-02-13_90fed2855f0003495ff60d47ddad14a8_icedid
-
Size
456KB
-
Sample
250213-q77vtayret
-
MD5
90fed2855f0003495ff60d47ddad14a8
-
SHA1
c5963014a06d55ab68ee393c0fd255fe9244d3b0
-
SHA256
4e8029a6c642310474a2baf6a1b0f655856ca39c5b944247435c0ee6daf16c8f
-
SHA512
8290dd62e2c79e5e6d848633fd2cdf73940f27e71e0c4d8e16588d67f82c9f7945f24f1898a27d9e2e04afe2a2319d52497e66b4aa8ac0e2979af450a2238f9a
-
SSDEEP
12288:sH9tNCsqbIoCyJgllh/krhMQUqKsRR2B9:ytEfbjJglvqyB9
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-13_90fed2855f0003495ff60d47ddad14a8_icedid.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-13_90fed2855f0003495ff60d47ddad14a8_icedid.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
emotet
Epoch1
24.249.135.121:80
185.94.252.13:443
149.62.173.247:8080
50.28.51.143:8080
80.249.176.206:80
5.196.35.138:7080
190.17.195.202:80
143.0.87.101:80
190.147.137.153:443
181.30.69.50:80
51.255.165.160:8080
190.96.118.251:443
72.47.248.48:7080
178.79.163.131:8080
212.231.60.98:80
187.162.248.237:80
2.47.112.152:80
68.183.190.199:8080
192.241.143.52:8080
77.55.211.77:8080
87.106.46.107:8080
191.182.6.118:80
189.1.185.98:8080
93.151.186.85:80
204.225.249.100:7080
177.73.0.98:443
137.74.106.111:7080
219.92.13.25:80
89.32.150.160:8080
82.240.207.95:443
190.6.193.152:8080
190.163.31.26:80
190.181.235.46:80
114.109.179.60:80
70.32.84.74:8080
94.176.234.118:443
77.90.136.129:8080
217.13.106.14:8080
212.71.237.140:8080
82.196.15.205:8080
181.129.96.162:8080
104.131.103.37:8080
83.169.21.32:7080
177.139.131.143:443
187.106.41.99:80
104.131.41.185:8080
192.241.146.84:8080
170.81.48.2:80
181.120.79.227:80
68.183.170.114:8080
177.72.13.80:80
61.92.159.208:8080
12.162.84.2:8080
186.70.127.199:8090
45.161.242.102:80
179.60.229.168:443
70.32.115.157:8080
191.99.160.58:80
172.104.169.32:8080
177.66.190.130:80
71.50.31.38:80
203.25.159.3:8080
185.94.252.12:80
217.199.160.224:7080
177.74.228.34:80
177.144.135.2:80
190.194.242.254:443
202.62.39.111:80
201.213.156.176:80
92.23.34.86:80
185.94.252.27:443
104.236.161.64:8080
181.167.96.215:80
111.67.12.221:8080
144.139.91.187:443
186.250.52.226:8080
46.28.111.142:7080
Targets
-
-
Target
2025-02-13_90fed2855f0003495ff60d47ddad14a8_icedid
-
Size
456KB
-
MD5
90fed2855f0003495ff60d47ddad14a8
-
SHA1
c5963014a06d55ab68ee393c0fd255fe9244d3b0
-
SHA256
4e8029a6c642310474a2baf6a1b0f655856ca39c5b944247435c0ee6daf16c8f
-
SHA512
8290dd62e2c79e5e6d848633fd2cdf73940f27e71e0c4d8e16588d67f82c9f7945f24f1898a27d9e2e04afe2a2319d52497e66b4aa8ac0e2979af450a2238f9a
-
SSDEEP
12288:sH9tNCsqbIoCyJgllh/krhMQUqKsRR2B9:ytEfbjJglvqyB9
-
Emotet family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1