General

  • Target

    2024-09-23_fc415b6469b1316087bdc9ab96573a09_hacktools_icedid_mimikatz

  • Size

    13.9MB

  • Sample

    240923-yw71fazcmm

  • MD5

    fc415b6469b1316087bdc9ab96573a09

  • SHA1

    e120b2ac8ff42388a3aabeffac7c2ce4cfc51153

  • SHA256

    aecdc3bbf45895b2036f5ad526615ffa54496c5f027939287024c2a7f8d57876

  • SHA512

    322b361800019e359639d132e5c1cb491332f3ca65f2cfa65ff70291839051760c037891e1a423fb87bf0c0fedd4800982c01b3ef1df716e50b1b06e3cfd77ad

  • SSDEEP

    98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr

Malware Config

Targets

    • Target

      2024-09-23_fc415b6469b1316087bdc9ab96573a09_hacktools_icedid_mimikatz

    • Size

      13.9MB

    • MD5

      fc415b6469b1316087bdc9ab96573a09

    • SHA1

      e120b2ac8ff42388a3aabeffac7c2ce4cfc51153

    • SHA256

      aecdc3bbf45895b2036f5ad526615ffa54496c5f027939287024c2a7f8d57876

    • SHA512

      322b361800019e359639d132e5c1cb491332f3ca65f2cfa65ff70291839051760c037891e1a423fb87bf0c0fedd4800982c01b3ef1df716e50b1b06e3cfd77ad

    • SSDEEP

      98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr

    • Disables service(s)

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Contacts a large (15646) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • OS Credential Dumping: LSASS Memory

      Malicious access to Credentials History.

    • XMRig Miner payload

    • mimikatz is an open source tool to dump credentials on Windows

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Creates a Windows Service

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.