General
-
Target
2024-12-03_afb8e2ead872eefac04661b7ba589d1d_icedid
-
Size
2.1MB
-
Sample
241203-pmdwkavpfs
-
MD5
afb8e2ead872eefac04661b7ba589d1d
-
SHA1
87ce5a2d367187e7b62cb886d8b31ee2bc424fc9
-
SHA256
3a83d1a2e375eb0b2d6745d55e2c9bd88fc27d313dba2cca16fe0a5daf9b0821
-
SHA512
fefe1833e25732809b2c6291f87d4b5e4f4194a572e6b1391e426d71ee494808f41d0d0d4821c7c5ec8c98e17542fad985f324020c150846a3b2d5473d780393
-
SSDEEP
49152:84ElVm6ey9wmB3Unfm8kPSthkB9y+28dB:0lVm6ey9l3UnexPtY
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-03_afb8e2ead872eefac04661b7ba589d1d_icedid.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
2024-12-03_afb8e2ead872eefac04661b7ba589d1d_icedid
-
Size
2.1MB
-
MD5
afb8e2ead872eefac04661b7ba589d1d
-
SHA1
87ce5a2d367187e7b62cb886d8b31ee2bc424fc9
-
SHA256
3a83d1a2e375eb0b2d6745d55e2c9bd88fc27d313dba2cca16fe0a5daf9b0821
-
SHA512
fefe1833e25732809b2c6291f87d4b5e4f4194a572e6b1391e426d71ee494808f41d0d0d4821c7c5ec8c98e17542fad985f324020c150846a3b2d5473d780393
-
SSDEEP
49152:84ElVm6ey9wmB3Unfm8kPSthkB9y+28dB:0lVm6ey9l3UnexPtY
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5