General
-
Target
2024-12-16_810b86d747461bd170974eae77c48571_icedid
-
Size
962KB
-
Sample
241216-g6qepszkcn
-
MD5
810b86d747461bd170974eae77c48571
-
SHA1
dfbe0e9ea32c74b603da683b0e7557e08d70add4
-
SHA256
86650dc86b71366c6393eb76dd6265c05fa86a5030c80e9b2dad72fd78695991
-
SHA512
cb1810410452026b2ae9f3449983f8091fe59d91131edccb46e2ffecd0059db851e56e15b4a0529c64430dbb5415952a871385a6e85f7bb2d386aecbcd84084b
-
SSDEEP
12288:bk3SQxRXr56OCnIrwCuEvggMFE7Tl9mcDc5TW0n/T+QNWmgQtqhYgqz:bk3SQxBdC7CuEvgv4Tls+gtKc
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-16_810b86d747461bd170974eae77c48571_icedid.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
2024-12-16_810b86d747461bd170974eae77c48571_icedid
-
Size
962KB
-
MD5
810b86d747461bd170974eae77c48571
-
SHA1
dfbe0e9ea32c74b603da683b0e7557e08d70add4
-
SHA256
86650dc86b71366c6393eb76dd6265c05fa86a5030c80e9b2dad72fd78695991
-
SHA512
cb1810410452026b2ae9f3449983f8091fe59d91131edccb46e2ffecd0059db851e56e15b4a0529c64430dbb5415952a871385a6e85f7bb2d386aecbcd84084b
-
SSDEEP
12288:bk3SQxRXr56OCnIrwCuEvggMFE7Tl9mcDc5TW0n/T+QNWmgQtqhYgqz:bk3SQxBdC7CuEvgv4Tls+gtKc
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5