General
-
Target
751da965b4a234f4b8eb77d84915f16b_icedid_JC.exe
-
Size
3.2MB
-
Sample
230805-rhmzsadb62
-
MD5
751da965b4a234f4b8eb77d84915f16b
-
SHA1
157fc004e90028246ed32bfdfb8268edc632c656
-
SHA256
1d17b36768e4ca6f5734da5b303555fd2a5965769b76f45437fba2c93a7f2cbf
-
SHA512
66079842dbcb956c9b8035740039f779dd365c0a1eca9e54697bf01730fd510a922620fb8434ccea0fe40a5b3163a719f41c2594ee315b9a4375361573b141c5
-
SSDEEP
24576:H4/Wa88nVxzV2ECqdBgJQUP5NTlGclSPgyghsGJ6wci5t4v6rM9WoFn3wTFk4aWI:ja8Nq49fmDWsGc3ckKdk33e0FyRZNbs
Static task
static1
Behavioral task
behavioral1
Sample
751da965b4a234f4b8eb77d84915f16b_icedid_JC.exe
Resource
win7-20230712-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
751da965b4a234f4b8eb77d84915f16b_icedid_JC.exe
-
Size
3.2MB
-
MD5
751da965b4a234f4b8eb77d84915f16b
-
SHA1
157fc004e90028246ed32bfdfb8268edc632c656
-
SHA256
1d17b36768e4ca6f5734da5b303555fd2a5965769b76f45437fba2c93a7f2cbf
-
SHA512
66079842dbcb956c9b8035740039f779dd365c0a1eca9e54697bf01730fd510a922620fb8434ccea0fe40a5b3163a719f41c2594ee315b9a4375361573b141c5
-
SSDEEP
24576:H4/Wa88nVxzV2ECqdBgJQUP5NTlGclSPgyghsGJ6wci5t4v6rM9WoFn3wTFk4aWI:ja8Nq49fmDWsGc3ckKdk33e0FyRZNbs
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5