General

  • Target

    2024-12-12_f5452cf4cbebff8d0557a5abe97f3892_icedid

  • Size

    360KB

  • Sample

    241212-l7z3ra1jdt

  • MD5

    f5452cf4cbebff8d0557a5abe97f3892

  • SHA1

    1b69f196e36561f5b0c597a4028d512cc6173855

  • SHA256

    435cd30dfb0b7a4c8342f0e1aff14e012199e6039c47b5d3df88a67ae251428d

  • SHA512

    b4ebea5dfffc7996f453147b858e54929658d97dcddfb93c13f7bfd79410af65627714d7ef1706dd5c394270b65375a3c58226de07d96f9ff2a33aaebfbc4d24

  • SSDEEP

    6144:7IuDCvUsM4J4Gz96R4UZ5PHasRmB6ZVLBXKOqZVu6soi:7IxvzLyhmcZVL9UVzsL

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      2024-12-12_f5452cf4cbebff8d0557a5abe97f3892_icedid

    • Size

      360KB

    • MD5

      f5452cf4cbebff8d0557a5abe97f3892

    • SHA1

      1b69f196e36561f5b0c597a4028d512cc6173855

    • SHA256

      435cd30dfb0b7a4c8342f0e1aff14e012199e6039c47b5d3df88a67ae251428d

    • SHA512

      b4ebea5dfffc7996f453147b858e54929658d97dcddfb93c13f7bfd79410af65627714d7ef1706dd5c394270b65375a3c58226de07d96f9ff2a33aaebfbc4d24

    • SSDEEP

      6144:7IuDCvUsM4J4Gz96R4UZ5PHasRmB6ZVLBXKOqZVu6soi:7IxvzLyhmcZVL9UVzsL

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks