General
-
Target
2024-12-15_61fb0420e4b1760d8f8be0fd074d3d6a_icedid
-
Size
1.1MB
-
Sample
241215-wp2tqstmgr
-
MD5
61fb0420e4b1760d8f8be0fd074d3d6a
-
SHA1
894b6d05b180d024fb538623071c806d766d1fac
-
SHA256
e2d0cd5a3a2b2df6bfb1a89fea0783fab489f052e446e172e0dec739a25740dd
-
SHA512
e746f80b04d9bf752582f61729eda0553413c40286abec2ba66a88604753be24c12e5b1e3c57e668ea32d1b317357c8a123eef3868ea5beebefc7a86f74de73e
-
SSDEEP
24576:sZT2K+zRJiT1DQzICqs4DJcahFVpdCX/xXubMy:A27RJ4DQzICqLJcEVdCX/x/y
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-15_61fb0420e4b1760d8f8be0fd074d3d6a_icedid.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
2024-12-15_61fb0420e4b1760d8f8be0fd074d3d6a_icedid
-
Size
1.1MB
-
MD5
61fb0420e4b1760d8f8be0fd074d3d6a
-
SHA1
894b6d05b180d024fb538623071c806d766d1fac
-
SHA256
e2d0cd5a3a2b2df6bfb1a89fea0783fab489f052e446e172e0dec739a25740dd
-
SHA512
e746f80b04d9bf752582f61729eda0553413c40286abec2ba66a88604753be24c12e5b1e3c57e668ea32d1b317357c8a123eef3868ea5beebefc7a86f74de73e
-
SSDEEP
24576:sZT2K+zRJiT1DQzICqs4DJcahFVpdCX/xXubMy:A27RJ4DQzICqLJcEVdCX/x/y
-
Modifies firewall policy service
-
Sality family
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5