General

  • Target

    2024-12-27_3842279e44e5289aaba9ddbb3643bf90_icedid

  • Size

    1001KB

  • Sample

    241227-h8l1qstjap

  • MD5

    3842279e44e5289aaba9ddbb3643bf90

  • SHA1

    364f4356124e101c8f212244035d9b22b83b7853

  • SHA256

    0238fc2da48e3a6b53d633dfaa7231628cadb76d961c2c688e8990f1192e4e61

  • SHA512

    be92b1976a5823cbcb5a0700fa1eca4eaf28a2e6ea948c0997a4012b02756071041c8705c704f3170ce7442e1bf2dc2c82458e77d88a3c8c9a2e71df5985d489

  • SSDEEP

    12288:Tas44a+GJczba9J8Dxzka8JmG4WjoLg+XVMYhV1iZ:Te4arcO8DRUsxWag6MgV1+

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      2024-12-27_3842279e44e5289aaba9ddbb3643bf90_icedid

    • Size

      1001KB

    • MD5

      3842279e44e5289aaba9ddbb3643bf90

    • SHA1

      364f4356124e101c8f212244035d9b22b83b7853

    • SHA256

      0238fc2da48e3a6b53d633dfaa7231628cadb76d961c2c688e8990f1192e4e61

    • SHA512

      be92b1976a5823cbcb5a0700fa1eca4eaf28a2e6ea948c0997a4012b02756071041c8705c704f3170ce7442e1bf2dc2c82458e77d88a3c8c9a2e71df5985d489

    • SSDEEP

      12288:Tas44a+GJczba9J8Dxzka8JmG4WjoLg+XVMYhV1iZ:Te4arcO8DRUsxWag6MgV1+

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks