General

  • Target

    2024-05-30_9b96b2075d88403ecf3076d0b27e2698_icedid

  • Size

    2.1MB

  • Sample

    240530-mh2qqaeb9v

  • MD5

    9b96b2075d88403ecf3076d0b27e2698

  • SHA1

    f9f7c62dd90fde32c06605dc46760c3205a66863

  • SHA256

    840bf309a4a8a5735725dcb9eca5df9b75ed34067d3403887fdb2cee1bf938d6

  • SHA512

    c510fcf45b16fe7931df807f7411f9bf9bb5d19403489b167fa41cad522705dbf8cff059d9cd975f5da6580af56592cf777753dcdf73ffbdd9d26bf3e9875672

  • SSDEEP

    49152:5b9nIbJhUOd1FAZ9l3UyAaR35K44KFarIOKpZzY82:N9nIbbjdrAZ7UyLR3ksFKIOKpZz

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      2024-05-30_9b96b2075d88403ecf3076d0b27e2698_icedid

    • Size

      2.1MB

    • MD5

      9b96b2075d88403ecf3076d0b27e2698

    • SHA1

      f9f7c62dd90fde32c06605dc46760c3205a66863

    • SHA256

      840bf309a4a8a5735725dcb9eca5df9b75ed34067d3403887fdb2cee1bf938d6

    • SHA512

      c510fcf45b16fe7931df807f7411f9bf9bb5d19403489b167fa41cad522705dbf8cff059d9cd975f5da6580af56592cf777753dcdf73ffbdd9d26bf3e9875672

    • SSDEEP

      49152:5b9nIbJhUOd1FAZ9l3UyAaR35K44KFarIOKpZzY82:N9nIbbjdrAZ7UyLR3ksFKIOKpZz

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks