General

  • Target

    2024-12-15_330e6083ec8c347fc4a190b245d5631f_icedid

  • Size

    620KB

  • Sample

    241215-bw5trasjep

  • MD5

    330e6083ec8c347fc4a190b245d5631f

  • SHA1

    85a6df809053543a8bca9fa09756ae6d1886409e

  • SHA256

    27b5eac9c1b44d9201c089a5435bc4c72f90d400163cf69135aa6d36bfa5057e

  • SHA512

    ab451b7beb47f94fabbbd8441751fd15107912f91bd251a46b646fd8c3c1473424f479a19a5c382817a2cff3cbca8c9b38986562d2b2bce33b4998a39dbeef58

  • SSDEEP

    12288:q675g4Ny1d66p2X+dVO8d3SKJ9zggp11s/:q6Ngp1d66p258diKJ9zggX+

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      2024-12-15_330e6083ec8c347fc4a190b245d5631f_icedid

    • Size

      620KB

    • MD5

      330e6083ec8c347fc4a190b245d5631f

    • SHA1

      85a6df809053543a8bca9fa09756ae6d1886409e

    • SHA256

      27b5eac9c1b44d9201c089a5435bc4c72f90d400163cf69135aa6d36bfa5057e

    • SHA512

      ab451b7beb47f94fabbbd8441751fd15107912f91bd251a46b646fd8c3c1473424f479a19a5c382817a2cff3cbca8c9b38986562d2b2bce33b4998a39dbeef58

    • SSDEEP

      12288:q675g4Ny1d66p2X+dVO8d3SKJ9zggp11s/:q6Ngp1d66p258diKJ9zggX+

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks