General
-
Target
2024-09-03_425b878f53e9590d3d3dcac565ad42aa_icedid
-
Size
1003KB
-
Sample
240903-srz65s1fma
-
MD5
425b878f53e9590d3d3dcac565ad42aa
-
SHA1
3a5523f06d8a33d97bcb0b65e445fb079feb0ddb
-
SHA256
527ee584a6d70c96448546746220d33c17facba8a910b860ffc7aa270d9fbe51
-
SHA512
368ce1eb4a7d89a86d33c8899624f1fa940b48e6c0614188edc69b10bd870836b9d6a2848b4e239fc7380a6d8cd5abc066b0f70dff32a4e9ffbbf437b3c10db1
-
SSDEEP
12288:CFR9Y+Zfqam9llIsjqgFc1ycKPWTW0n/T+QNWmgfWVta9H:CFR9Y+Z0llIYPFQPsWVtcH
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-03_425b878f53e9590d3d3dcac565ad42aa_icedid.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
2024-09-03_425b878f53e9590d3d3dcac565ad42aa_icedid
-
Size
1003KB
-
MD5
425b878f53e9590d3d3dcac565ad42aa
-
SHA1
3a5523f06d8a33d97bcb0b65e445fb079feb0ddb
-
SHA256
527ee584a6d70c96448546746220d33c17facba8a910b860ffc7aa270d9fbe51
-
SHA512
368ce1eb4a7d89a86d33c8899624f1fa940b48e6c0614188edc69b10bd870836b9d6a2848b4e239fc7380a6d8cd5abc066b0f70dff32a4e9ffbbf437b3c10db1
-
SSDEEP
12288:CFR9Y+Zfqam9llIsjqgFc1ycKPWTW0n/T+QNWmgfWVta9H:CFR9Y+Z0llIYPFQPsWVtcH
-
Modifies firewall policy service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5