General

  • Target

    2024-05-28_76ce96b010840b50bc75131ac1775a19_icedid

  • Size

    6.1MB

  • Sample

    240528-1ef7hadb6t

  • MD5

    76ce96b010840b50bc75131ac1775a19

  • SHA1

    27a76e71525d3031a04ab9d8d0ba881d7830309d

  • SHA256

    999130321e88b3ff5906b1ead86115ff7f979939c810a4a6654fe1ef6df5843e

  • SHA512

    a9ef324b34797cc62e050bfb79a917716b498e8fe4d0295c01781c6cf9de3697f7bda73d58fc7227507bf2c7be6793c1959a997f0a1ef71a98fb2e807d86c382

  • SSDEEP

    49152:VPAPQZCL5NwrTGaSHxDQtxUffJBEagtR+QjfAPR0F:x3CrwrSaoxDdffVgtRdCI

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      2024-05-28_76ce96b010840b50bc75131ac1775a19_icedid

    • Size

      6.1MB

    • MD5

      76ce96b010840b50bc75131ac1775a19

    • SHA1

      27a76e71525d3031a04ab9d8d0ba881d7830309d

    • SHA256

      999130321e88b3ff5906b1ead86115ff7f979939c810a4a6654fe1ef6df5843e

    • SHA512

      a9ef324b34797cc62e050bfb79a917716b498e8fe4d0295c01781c6cf9de3697f7bda73d58fc7227507bf2c7be6793c1959a997f0a1ef71a98fb2e807d86c382

    • SSDEEP

      49152:VPAPQZCL5NwrTGaSHxDQtxUffJBEagtR+QjfAPR0F:x3CrwrSaoxDdffVgtRdCI

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks