heroui logo

Drop IcedID License dat

Splunk Security Content

View Source
Summary
The detection rule, named "Drop IcedID License dat," is designed to identify the dropping of a suspicious file called "license.dat" within both the %appdata% and %programdata% directories on Windows systems. This file is associated with the IcedID malware, which is utilized for banking credential theft. The rule uses Sysmon EventCode 11, which logs file creation events, to trigger an alert when this specific file is created in the aforementioned critical directories. The ability to detect the 'license.dat' file is significant as it signals potential malware infection aimed at compromising sensitive banking information, which could lead to unauthorized financial access and potential data breaches. The search query implemented requires the monitoring of the file paths mentioned along with relevant process details, ensuring that organizations can swiftly identify and respond to this malicious behavior. The rule is currently in production status as of November 2024, and it has been authored by Teoderick Contreras from Splunk, emphasizing its credibility and alignment with cybersecurity best practices.
Categories
  • Endpoint
Data Sources
  • Process
  • File
ATT&CK Techniques
  • T1204
  • T1204.002
Created: 2024-11-13