General

  • Target

    2023-08-26_2531d96393695a4a2c1258f0c0d9f4c3_icedid_JC.exe

  • Size

    437KB

  • Sample

    231012-ca9fgsha4x

  • MD5

    2531d96393695a4a2c1258f0c0d9f4c3

  • SHA1

    8539e32dd4fee240471a189372aa1420ce7c67dc

  • SHA256

    9ab36e49c71327684708541a2664ffdd1bdf5ceba5600e3b3b0c0169342f8158

  • SHA512

    8fc51efc3ee6c9287540d666c86a7f82c8fc564714f17fdea3a98c5aa0f9162c3338e918f99a45f8b83bff55b77a0d925977524f96bc6b2eff5753cdea939a71

  • SSDEEP

    6144:NsYQXsnUVx4ZXvQShdciXvbGLcqBG65tufv1Qp9A2+94juR1y93kxhLAdWWX4Kx0:NjndvQSrLXvbGIqBGr1m+917L79Kx0

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      2023-08-26_2531d96393695a4a2c1258f0c0d9f4c3_icedid_JC.exe

    • Size

      437KB

    • MD5

      2531d96393695a4a2c1258f0c0d9f4c3

    • SHA1

      8539e32dd4fee240471a189372aa1420ce7c67dc

    • SHA256

      9ab36e49c71327684708541a2664ffdd1bdf5ceba5600e3b3b0c0169342f8158

    • SHA512

      8fc51efc3ee6c9287540d666c86a7f82c8fc564714f17fdea3a98c5aa0f9162c3338e918f99a45f8b83bff55b77a0d925977524f96bc6b2eff5753cdea939a71

    • SSDEEP

      6144:NsYQXsnUVx4ZXvQShdciXvbGLcqBG65tufv1Qp9A2+94juR1y93kxhLAdWWX4Kx0:NjndvQSrLXvbGIqBGr1m+917L79Kx0

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks