General

  • Target

    2024-12-27_05571416b33d35a2809d437570ff7786_icedid

  • Size

    1.7MB

  • Sample

    241227-lw6q6atpet

  • MD5

    05571416b33d35a2809d437570ff7786

  • SHA1

    8c60fda717b469f85bba49474ab5acce029768f9

  • SHA256

    4104db6b7371b3d1cdf115e325f3cac026f4e15726cbc7999babcf347bb792a3

  • SHA512

    cbd79fd8a95cfe6adf5b8d88b9647460700e6b5372b681a4fdab8d377bffc7f51bc257bb5483bfae23d2714944556b6d7cc517b7b4a7ec6891b82271cb7dd7b3

  • SSDEEP

    49152:8fsZaPxK+/B5QccVl7mJXD/wnOJtwVnPIJfC/bR3eN8tN2zu3usDCaWE:bZaPxKY5Q73mJXD/wnOJtwVPIxWbdN2g

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      2024-12-27_05571416b33d35a2809d437570ff7786_icedid

    • Size

      1.7MB

    • MD5

      05571416b33d35a2809d437570ff7786

    • SHA1

      8c60fda717b469f85bba49474ab5acce029768f9

    • SHA256

      4104db6b7371b3d1cdf115e325f3cac026f4e15726cbc7999babcf347bb792a3

    • SHA512

      cbd79fd8a95cfe6adf5b8d88b9647460700e6b5372b681a4fdab8d377bffc7f51bc257bb5483bfae23d2714944556b6d7cc517b7b4a7ec6891b82271cb7dd7b3

    • SSDEEP

      49152:8fsZaPxK+/B5QccVl7mJXD/wnOJtwVnPIJfC/bR3eN8tN2zu3usDCaWE:bZaPxKY5Q73mJXD/wnOJtwVPIxWbdN2g

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks