General
-
Target
2024-06-08_5ef18e65569f7e2cb9e5a44b1b5a05d4_icedid
-
Size
2.0MB
-
Sample
240608-hfaf8sag93
-
MD5
5ef18e65569f7e2cb9e5a44b1b5a05d4
-
SHA1
0a53ffe7b937a1290f5895c3eef6c636e1b9dc98
-
SHA256
ce6a215da38a319a85db3ac629cae65c35daabc82cff9b55ba32a8cdc3765b0c
-
SHA512
6518d9d676dbd4310172a7a35bdc3bedcfbb6518a7755874ffde88be740bfedabb60f06f4f46ca381b811da57246123d674dbd23a704f91723c6583a9085cf39
-
SSDEEP
49152:l0GltjP+p2SeuoLEVn3JXuPwlsJDE5pAbpL3QiOyt8i:hlt6euKskPIse5pAZQiL
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-08_5ef18e65569f7e2cb9e5a44b1b5a05d4_icedid.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
2024-06-08_5ef18e65569f7e2cb9e5a44b1b5a05d4_icedid
-
Size
2.0MB
-
MD5
5ef18e65569f7e2cb9e5a44b1b5a05d4
-
SHA1
0a53ffe7b937a1290f5895c3eef6c636e1b9dc98
-
SHA256
ce6a215da38a319a85db3ac629cae65c35daabc82cff9b55ba32a8cdc3765b0c
-
SHA512
6518d9d676dbd4310172a7a35bdc3bedcfbb6518a7755874ffde88be740bfedabb60f06f4f46ca381b811da57246123d674dbd23a704f91723c6583a9085cf39
-
SSDEEP
49152:l0GltjP+p2SeuoLEVn3JXuPwlsJDE5pAbpL3QiOyt8i:hlt6euKskPIse5pAZQiL
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Modifies Windows Firewall
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
2Windows Service
2Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1