General

  • Target

    2024-05-28_b88d815e6c6021e5e71c770df54f0e25_bkransomware_icedid

  • Size

    478KB

  • Sample

    240528-rx6qfahb4y

  • MD5

    b88d815e6c6021e5e71c770df54f0e25

  • SHA1

    58a1ad69bdb692b85c3c35865ed482fee219e4d4

  • SHA256

    cb810051b866ab2090e5ad31f2cf6d97252295a3dfb1fb8f3e233a2ea4ff2c0c

  • SHA512

    c1b0b2e2cac8e32d22563e3fbf5211cd597189d26639a13dedd0d9bcfd34a8bc35fc22df6d929abe7e017deffe999810b321049df710191f200a193900b7d94a

  • SSDEEP

    6144:SaUSeyqj6ztvrfMqBODlRC7r0Hg77nyihK6cO40YFuiaCUjkAvblW:S/SRvAMqlRorIg7nIIhUQbI

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      2024-05-28_b88d815e6c6021e5e71c770df54f0e25_bkransomware_icedid

    • Size

      478KB

    • MD5

      b88d815e6c6021e5e71c770df54f0e25

    • SHA1

      58a1ad69bdb692b85c3c35865ed482fee219e4d4

    • SHA256

      cb810051b866ab2090e5ad31f2cf6d97252295a3dfb1fb8f3e233a2ea4ff2c0c

    • SHA512

      c1b0b2e2cac8e32d22563e3fbf5211cd597189d26639a13dedd0d9bcfd34a8bc35fc22df6d929abe7e017deffe999810b321049df710191f200a193900b7d94a

    • SSDEEP

      6144:SaUSeyqj6ztvrfMqBODlRC7r0Hg77nyihK6cO40YFuiaCUjkAvblW:S/SRvAMqlRorIg7nIIhUQbI

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks