General

  • Target

    2024-10-25_9b51246142bebbeb2a490d2762a0066a_hacktools_icedid_mimikatz

  • Size

    9.2MB

  • Sample

    241025-nrkz1ayejh

  • MD5

    9b51246142bebbeb2a490d2762a0066a

  • SHA1

    b5ae5d342ae8e58d78cd25792bfd1eed7a795932

  • SHA256

    4f0d6cd4944cd67fb36c0673b10fc8ce09bd268efe02ce1a1292b20fd9bea834

  • SHA512

    928e09ca3d9f013d249426f2b1ba5fd71e39d6e9df0ce47022f78881347ee9f6a1cf62562dcd3c85377e6d28daf9b45cc7ab746aca6a08701fb7d0dbe02311a7

  • SSDEEP

    196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1

Malware Config

Targets

    • Target

      2024-10-25_9b51246142bebbeb2a490d2762a0066a_hacktools_icedid_mimikatz

    • Size

      9.2MB

    • MD5

      9b51246142bebbeb2a490d2762a0066a

    • SHA1

      b5ae5d342ae8e58d78cd25792bfd1eed7a795932

    • SHA256

      4f0d6cd4944cd67fb36c0673b10fc8ce09bd268efe02ce1a1292b20fd9bea834

    • SHA512

      928e09ca3d9f013d249426f2b1ba5fd71e39d6e9df0ce47022f78881347ee9f6a1cf62562dcd3c85377e6d28daf9b45cc7ab746aca6a08701fb7d0dbe02311a7

    • SSDEEP

      196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1

    • Disables service(s)

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Contacts a large (26707) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • OS Credential Dumping: LSASS Memory

      Malicious access to Credentials History.

    • XMRig Miner payload

    • mimikatz is an open source tool to dump credentials on Windows

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Creates a Windows Service

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks