General
-
Target
2024-05-27_55583b5d1cf5bf17a8a444d703105a51_icedid_nymaim
-
Size
4.4MB
-
Sample
240527-3d871afa76
-
MD5
55583b5d1cf5bf17a8a444d703105a51
-
SHA1
4505a809d5a47b3d13fc687c202734922f227f4b
-
SHA256
7b58053dd98be526f54646ff764e3a08e83ae5fae1975ddd5ad2f9f4197bdd49
-
SHA512
f87c625903653c14a26d2c4959bcad0a08974ff46c562a99749031ab585238bc759072ce5b2bd1e0d60ce2e524cc84a4e64c41fd09870c5062037b8cbb5f2daa
-
SSDEEP
49152:LFic9QERhCbKh4w8OZLniJdfdPxTROPE41oS5HiAGuj7Ql:Lv9QUHhmarwdPBRi1T5HiAGse
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-27_55583b5d1cf5bf17a8a444d703105a51_icedid_nymaim.exe
Resource
win7-20240419-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
2024-05-27_55583b5d1cf5bf17a8a444d703105a51_icedid_nymaim
-
Size
4.4MB
-
MD5
55583b5d1cf5bf17a8a444d703105a51
-
SHA1
4505a809d5a47b3d13fc687c202734922f227f4b
-
SHA256
7b58053dd98be526f54646ff764e3a08e83ae5fae1975ddd5ad2f9f4197bdd49
-
SHA512
f87c625903653c14a26d2c4959bcad0a08974ff46c562a99749031ab585238bc759072ce5b2bd1e0d60ce2e524cc84a4e64c41fd09870c5062037b8cbb5f2daa
-
SSDEEP
49152:LFic9QERhCbKh4w8OZLniJdfdPxTROPE41oS5HiAGuj7Ql:Lv9QUHhmarwdPBRi1T5HiAGse
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5