General

  • Target

    2024-05-28_6a2839b47bde6cb093f618cfd6fe63a4_darpapox_icedid_nymaim

  • Size

    11.5MB

  • Sample

    240528-1dc4fsed28

  • MD5

    6a2839b47bde6cb093f618cfd6fe63a4

  • SHA1

    f892a7537f9cb00cb1c5b1aefe8652b59aed818c

  • SHA256

    eca844e81be6c7c82a329dfb4d31bc61a7d6b82e64758cb1cdbf15450910d686

  • SHA512

    010a5e7b4bf8a649529745d1fd0ccb4712c7c6047e6bc916a5b4145f8fcb44ed98dce34e9e47b02a9d1da84c02db42a38bc5df2c8f713650775874e8ee523812

  • SSDEEP

    98304:rSy3mKysr9uBx4WZTvyqL+R6ZiFLOAkGkzdnEVomFHKnPLc96hxvWbrtUTrUHO23:rjB2AqL+RPFLOyomFHKnPLcAx+NcIOA

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      2024-05-28_6a2839b47bde6cb093f618cfd6fe63a4_darpapox_icedid_nymaim

    • Size

      11.5MB

    • MD5

      6a2839b47bde6cb093f618cfd6fe63a4

    • SHA1

      f892a7537f9cb00cb1c5b1aefe8652b59aed818c

    • SHA256

      eca844e81be6c7c82a329dfb4d31bc61a7d6b82e64758cb1cdbf15450910d686

    • SHA512

      010a5e7b4bf8a649529745d1fd0ccb4712c7c6047e6bc916a5b4145f8fcb44ed98dce34e9e47b02a9d1da84c02db42a38bc5df2c8f713650775874e8ee523812

    • SSDEEP

      98304:rSy3mKysr9uBx4WZTvyqL+R6ZiFLOAkGkzdnEVomFHKnPLc96hxvWbrtUTrUHO23:rjB2AqL+RPFLOyomFHKnPLcAx+NcIOA

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks