General
-
Target
2024-12-06_4739d20a68dd8fefa7e2f2c8dabeafea_icedid
-
Size
568KB
-
Sample
241206-r3vv5ayjdk
-
MD5
4739d20a68dd8fefa7e2f2c8dabeafea
-
SHA1
dbefa22ee5620f112c94dcfbb4582afd964d54bd
-
SHA256
15b02cc5b01f910fc1766bb813f0fc441e12e885175bb8d431576ef8154854ee
-
SHA512
4acd74f6a54b7e3d27f577407dbc4737133982924a1728865c9bc5547851bbb4dde5ba62e2d83f6c758101e4a48451e489b8417b44285ed60605aadf98c693b7
-
SSDEEP
12288:dGB2xHA9eN5NR4D3J4yvQmUt1z9u7PHncuN5AZ:dWyLYD3+yJe1078gCZ
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-06_4739d20a68dd8fefa7e2f2c8dabeafea_icedid.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
2024-12-06_4739d20a68dd8fefa7e2f2c8dabeafea_icedid
-
Size
568KB
-
MD5
4739d20a68dd8fefa7e2f2c8dabeafea
-
SHA1
dbefa22ee5620f112c94dcfbb4582afd964d54bd
-
SHA256
15b02cc5b01f910fc1766bb813f0fc441e12e885175bb8d431576ef8154854ee
-
SHA512
4acd74f6a54b7e3d27f577407dbc4737133982924a1728865c9bc5547851bbb4dde5ba62e2d83f6c758101e4a48451e489b8417b44285ed60605aadf98c693b7
-
SSDEEP
12288:dGB2xHA9eN5NR4D3J4yvQmUt1z9u7PHncuN5AZ:dWyLYD3+yJe1078gCZ
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5