General

  • Target

    2024-12-26_1ba60541bc4a41782d47cade2fcfcb93_icedid

  • Size

    1.8MB

  • Sample

    241226-ghsvxsykek

  • MD5

    1ba60541bc4a41782d47cade2fcfcb93

  • SHA1

    2919a0f345af443e31b7b5842ac900f953f46fc8

  • SHA256

    dfd43fea465638d17fd30745e0b1245cc095a763c780fafc3417e3967f1bec4c

  • SHA512

    66dd27884e774f04a1ab52db7e56ddd3c8e0c05ee07593a4eb5660629997aca8e47af7e651212a8cc9e7787549f15637575ace9f6387e37bb766d8bd53e6f67a

  • SSDEEP

    49152:6DhY1fd+0dIz9ZcGDNXMEIRsyZ+a6uOj+GVU9RwC2:ghG+/z3dD9MEIRN0aFO5VU9RE

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      2024-12-26_1ba60541bc4a41782d47cade2fcfcb93_icedid

    • Size

      1.8MB

    • MD5

      1ba60541bc4a41782d47cade2fcfcb93

    • SHA1

      2919a0f345af443e31b7b5842ac900f953f46fc8

    • SHA256

      dfd43fea465638d17fd30745e0b1245cc095a763c780fafc3417e3967f1bec4c

    • SHA512

      66dd27884e774f04a1ab52db7e56ddd3c8e0c05ee07593a4eb5660629997aca8e47af7e651212a8cc9e7787549f15637575ace9f6387e37bb766d8bd53e6f67a

    • SSDEEP

      49152:6DhY1fd+0dIz9ZcGDNXMEIRsyZ+a6uOj+GVU9RwC2:ghG+/z3dD9MEIRN0aFO5VU9RE

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks