General
-
Target
946e97330f01a5d7bdd7a75c3358a4f0_hacktools_icedid_mimikatz_JC.exe
-
Size
9.4MB
-
Sample
230808-sacphsdb57
-
MD5
946e97330f01a5d7bdd7a75c3358a4f0
-
SHA1
520ff59aab1ccda10100f0390ec530ea5fb03c22
-
SHA256
44f248766ff433f760dca56b9e9cd8b775bc0eed1a708a95a471b480a4fac0d8
-
SHA512
9fb42dfe08b61ecafe7864cc43d57a41f9166c3335fc2b29321bd68bfe201374882db9e0c4eb4e4aa0c4888945e80e80561107e3e346d7672b8244199dc28384
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Behavioral task
behavioral1
Sample
946e97330f01a5d7bdd7a75c3358a4f0_hacktools_icedid_mimikatz_JC.exe
Resource
win7-20230712-en
Malware Config
Targets
-
-
Target
946e97330f01a5d7bdd7a75c3358a4f0_hacktools_icedid_mimikatz_JC.exe
-
Size
9.4MB
-
MD5
946e97330f01a5d7bdd7a75c3358a4f0
-
SHA1
520ff59aab1ccda10100f0390ec530ea5fb03c22
-
SHA256
44f248766ff433f760dca56b9e9cd8b775bc0eed1a708a95a471b480a4fac0d8
-
SHA512
9fb42dfe08b61ecafe7864cc43d57a41f9166c3335fc2b29321bd68bfe201374882db9e0c4eb4e4aa0c4888945e80e80561107e3e346d7672b8244199dc28384
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Contacts a large (22978) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (26551) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
XMRig Miner payload
-
mimikatz is an open source tool to dump credentials on Windows
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Sets file execution options in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Creates a Windows Service
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1