General
-
Target
2024-12-29_298f9ed6f57ddfe74b4387343d61fab7_icedid_luca-stealer
-
Size
2.9MB
-
Sample
241229-kl25jsxpax
-
MD5
298f9ed6f57ddfe74b4387343d61fab7
-
SHA1
5a1ceeab2b21c2d33cd76d16b7f4c541093ae6ae
-
SHA256
9d72676fc12d1380871348639efa6ef74c0ea42f9bcbee5dd4b9a5e80dc4a463
-
SHA512
579a0f600078d2bb2362c1004d3e30ced5de954f8306c62426323490b75d39f70d4ff0599b841048b9010ee2e04b0e3a050af9e97e957c7c66488231b6f73138
-
SSDEEP
49152:Nkeaz92qEkr9yBn/pjV4ywMVtsG8QQN3o/Hio3FFzc/1AFuzC8:NkJz92eron/pjV4ywMVtsOQN3o/Hio3Y
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-29_298f9ed6f57ddfe74b4387343d61fab7_icedid_luca-stealer.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
2024-12-29_298f9ed6f57ddfe74b4387343d61fab7_icedid_luca-stealer
-
Size
2.9MB
-
MD5
298f9ed6f57ddfe74b4387343d61fab7
-
SHA1
5a1ceeab2b21c2d33cd76d16b7f4c541093ae6ae
-
SHA256
9d72676fc12d1380871348639efa6ef74c0ea42f9bcbee5dd4b9a5e80dc4a463
-
SHA512
579a0f600078d2bb2362c1004d3e30ced5de954f8306c62426323490b75d39f70d4ff0599b841048b9010ee2e04b0e3a050af9e97e957c7c66488231b6f73138
-
SSDEEP
49152:Nkeaz92qEkr9yBn/pjV4ywMVtsG8QQN3o/Hio3FFzc/1AFuzC8:NkJz92eron/pjV4ywMVtsOQN3o/Hio3Y
-
Modifies firewall policy service
-
Sality family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5