General
-
Target
2024-05-22_44657a8b74f66eeac1b740096c60ddf6_icedid
-
Size
1.9MB
-
Sample
240522-r1y5rsef46
-
MD5
44657a8b74f66eeac1b740096c60ddf6
-
SHA1
29edfd7faabc9b8892e024b01d310713df0319d8
-
SHA256
215e033c15a2242c3dab802f0c71964ceedb9d903f3e5e7f8b28bf0c82631542
-
SHA512
297af316011b5bbb1c5421a56517a8f85833eabea6c411ddcf100aa4c9acf77023b3909ab1fa759f7a112d2e35d12150e4dcfce2ead93f396972e9461662d0eb
-
SSDEEP
24576:v3eIenKQZrLeaU7N8d5FcVMYPsk28NFgCXX0B2ySzG3NaW:vYnLtLed0qET8NFgdBGId
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_44657a8b74f66eeac1b740096c60ddf6_icedid.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
2024-05-22_44657a8b74f66eeac1b740096c60ddf6_icedid
-
Size
1.9MB
-
MD5
44657a8b74f66eeac1b740096c60ddf6
-
SHA1
29edfd7faabc9b8892e024b01d310713df0319d8
-
SHA256
215e033c15a2242c3dab802f0c71964ceedb9d903f3e5e7f8b28bf0c82631542
-
SHA512
297af316011b5bbb1c5421a56517a8f85833eabea6c411ddcf100aa4c9acf77023b3909ab1fa759f7a112d2e35d12150e4dcfce2ead93f396972e9461662d0eb
-
SSDEEP
24576:v3eIenKQZrLeaU7N8d5FcVMYPsk28NFgCXX0B2ySzG3NaW:vYnLtLed0qET8NFgdBGId
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5