General

  • Target

    iceix_1.2.6.4.vir

  • Size

    383KB

  • Sample

    200719-zllgaa1v4s

  • MD5

    0deaa0d1c6973665b40db76bed2897c3

  • SHA1

    32fcfd4c0a1f1c5a46f5dae3b8140e8cc41c5a20

  • SHA256

    6d8f99b5f17d74011562db2b88a2d6feb86bc7e697d5735f1feb1838ecaaaf96

  • SHA512

    d70a85fe5645e8cd76f2426b510b90554dea3b7ba6f421ac5f00a85ef1f30df211e722fd582c619eb7bc8783407d29c4a55459924a558b5747380e94808327f8

Score
8/10

Malware Config

Targets

    • Target

      iceix_1.2.6.4.vir

    • Size

      383KB

    • MD5

      0deaa0d1c6973665b40db76bed2897c3

    • SHA1

      32fcfd4c0a1f1c5a46f5dae3b8140e8cc41c5a20

    • SHA256

      6d8f99b5f17d74011562db2b88a2d6feb86bc7e697d5735f1feb1838ecaaaf96

    • SHA512

      d70a85fe5645e8cd76f2426b510b90554dea3b7ba6f421ac5f00a85ef1f30df211e722fd582c619eb7bc8783407d29c4a55459924a558b5747380e94808327f8

    Score
    8/10
    • Executes dropped EXE

    • Modifies Windows Firewall

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Tasks