General
-
Target
2024-05-28_509dc57fe76d6a3a112417f5e3e780d4_icedid
-
Size
407KB
-
Sample
240528-ays3ashb25
-
MD5
509dc57fe76d6a3a112417f5e3e780d4
-
SHA1
b5df1ba20c52660fda9cf739da399ec2989a3fcb
-
SHA256
081c042f0d27e44f5883e668cff8132d4d9d5c9f656a625af5239845aa036576
-
SHA512
4cb149d8aa68b6e401fcd6265d600c0812ff0aa0bf7e2bf82918e876f06826351dc7b8d1336767c1e60df779b09d2c76d4ce36690845c8d0711f0854d8362253
-
SSDEEP
6144:fy3ogtorZiarKWa8ocO6c3u29JtKMoZ1gOHgS+ahBf78bfj7IHHNGq:3gKVA6c3u29JtKMogSjowHHNGq
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-28_509dc57fe76d6a3a112417f5e3e780d4_icedid.exe
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
2024-05-28_509dc57fe76d6a3a112417f5e3e780d4_icedid
-
Size
407KB
-
MD5
509dc57fe76d6a3a112417f5e3e780d4
-
SHA1
b5df1ba20c52660fda9cf739da399ec2989a3fcb
-
SHA256
081c042f0d27e44f5883e668cff8132d4d9d5c9f656a625af5239845aa036576
-
SHA512
4cb149d8aa68b6e401fcd6265d600c0812ff0aa0bf7e2bf82918e876f06826351dc7b8d1336767c1e60df779b09d2c76d4ce36690845c8d0711f0854d8362253
-
SSDEEP
6144:fy3ogtorZiarKWa8ocO6c3u29JtKMoZ1gOHgS+ahBf78bfj7IHHNGq:3gKVA6c3u29JtKMogSjowHHNGq
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5