General

  • Target

    2024-05-28_36fb7c68da3fc11162409029bb5539b8_icedid_ramnit

  • Size

    1.9MB

  • Sample

    240528-m3yvkahe22

  • MD5

    36fb7c68da3fc11162409029bb5539b8

  • SHA1

    5405ee370a56219ef379fe1906495bb833dcc43d

  • SHA256

    220b52976ed6f0bf0cfed381f4c66dcd5ce983745232b947a763cd7bb798dbd2

  • SHA512

    b5da27f82bec973a0cfef5284b2d413091bb69d5ab67d5244e96fd23930549f80c82c44cc470d5da508be8a315186459218e710ff57dc9d11c3998b4ae9e6050

  • SSDEEP

    49152:itgF4vrxgeRwblCvQ3g7c39j1AX/ECZViEJk/:i2FAgn8I3g7cNjSPXZVE/

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      2024-05-28_36fb7c68da3fc11162409029bb5539b8_icedid_ramnit

    • Size

      1.9MB

    • MD5

      36fb7c68da3fc11162409029bb5539b8

    • SHA1

      5405ee370a56219ef379fe1906495bb833dcc43d

    • SHA256

      220b52976ed6f0bf0cfed381f4c66dcd5ce983745232b947a763cd7bb798dbd2

    • SHA512

      b5da27f82bec973a0cfef5284b2d413091bb69d5ab67d5244e96fd23930549f80c82c44cc470d5da508be8a315186459218e710ff57dc9d11c3998b4ae9e6050

    • SSDEEP

      49152:itgF4vrxgeRwblCvQ3g7c39j1AX/ECZViEJk/:i2FAgn8I3g7cNjSPXZVE/

    • Modifies firewall policy service

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks