General

  • Target

    2024-12-03_afb8e2ead872eefac04661b7ba589d1d_icedid

  • Size

    2.1MB

  • Sample

    241203-pmdwkavpfs

  • MD5

    afb8e2ead872eefac04661b7ba589d1d

  • SHA1

    87ce5a2d367187e7b62cb886d8b31ee2bc424fc9

  • SHA256

    3a83d1a2e375eb0b2d6745d55e2c9bd88fc27d313dba2cca16fe0a5daf9b0821

  • SHA512

    fefe1833e25732809b2c6291f87d4b5e4f4194a572e6b1391e426d71ee494808f41d0d0d4821c7c5ec8c98e17542fad985f324020c150846a3b2d5473d780393

  • SSDEEP

    49152:84ElVm6ey9wmB3Unfm8kPSthkB9y+28dB:0lVm6ey9l3UnexPtY

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      2024-12-03_afb8e2ead872eefac04661b7ba589d1d_icedid

    • Size

      2.1MB

    • MD5

      afb8e2ead872eefac04661b7ba589d1d

    • SHA1

      87ce5a2d367187e7b62cb886d8b31ee2bc424fc9

    • SHA256

      3a83d1a2e375eb0b2d6745d55e2c9bd88fc27d313dba2cca16fe0a5daf9b0821

    • SHA512

      fefe1833e25732809b2c6291f87d4b5e4f4194a572e6b1391e426d71ee494808f41d0d0d4821c7c5ec8c98e17542fad985f324020c150846a3b2d5473d780393

    • SSDEEP

      49152:84ElVm6ey9wmB3Unfm8kPSthkB9y+28dB:0lVm6ey9l3UnexPtY

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks