General
-
Target
2025-02-21_281cc94d2901bf803804d760c7b76959_icedid
-
Size
953KB
-
Sample
250221-fkvxmatkbt
-
MD5
281cc94d2901bf803804d760c7b76959
-
SHA1
4cad2ffdb8b2df8d6b469f0a3e37086e0bc0592d
-
SHA256
2b13195c5b13879889543660e9c3a2b163926d9b955760ca045a75a22b49ba88
-
SHA512
30ff6a2b2f3edfbe0dd5a7a624ae6ef4ce3339f2e749b586962c0bb90dfc21747d6e6a242f1507866ced1368121619b713700e01e3316fcf5a658ec5dd6540ed
-
SSDEEP
6144:3UsBrtF1RUVevGXdfp4H8Z2l4LNOgNpBPVs1Dwr3eV9z6Tk6kD55JwOVkPEG/8jF:3FBBFbaevGXdfpg8FpBPZku/8SW
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-21_281cc94d2901bf803804d760c7b76959_icedid.exe
Resource
win7-20250207-en
Malware Config
Extracted
phorphiex
http://185.215.113.66/
http://91.202.233.141/
0xCa90599132C4D88907Bd8E046540284aa468a035
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9
AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z
LdgchXq1sKbAaAJ1EXAPSRBzLb8jnTZstT
MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q
4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3ESHude8zUHksQg1h6hHmzY79BS36L91Yn
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2
bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr
bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
-
mutex
753f85d83d
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36
Extracted
phorphiex
http://185.215.113.66
Targets
-
-
Target
2025-02-21_281cc94d2901bf803804d760c7b76959_icedid
-
Size
953KB
-
MD5
281cc94d2901bf803804d760c7b76959
-
SHA1
4cad2ffdb8b2df8d6b469f0a3e37086e0bc0592d
-
SHA256
2b13195c5b13879889543660e9c3a2b163926d9b955760ca045a75a22b49ba88
-
SHA512
30ff6a2b2f3edfbe0dd5a7a624ae6ef4ce3339f2e749b586962c0bb90dfc21747d6e6a242f1507866ced1368121619b713700e01e3316fcf5a658ec5dd6540ed
-
SSDEEP
6144:3UsBrtF1RUVevGXdfp4H8Z2l4LNOgNpBPVs1Dwr3eV9z6Tk6kD55JwOVkPEG/8jF:3FBBFbaevGXdfpg8FpBPZku/8SW
-
Phorphiex family
-
Phorphiex payload
-
Xmrig family
-
XMRig Miner payload
-
Creates new service(s)
-
Downloads MZ/PE file
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Indicator Removal: Clear Persistence
Clear artifacts associated with previously established persistence like scheduletasks on a host.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
1Indicator Removal
1Clear Persistence
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1