General

  • Target

    2024-05-29_e1016d3146008b6611fc4f9206f5c37a_icedid

  • Size

    3.8MB

  • Sample

    240529-qze5tsha83

  • MD5

    e1016d3146008b6611fc4f9206f5c37a

  • SHA1

    79e50d5162eb6a09191f0f83666501be45a3e8ab

  • SHA256

    5bcb61e6a7a61aedad37aef9f90dff61074e72212b77257f5ab9d5cac4996e17

  • SHA512

    11f355b2aa3c9845d92c894c2f77e2f311d9bfe863936be9ef00012a9fb17546a73e3dd4bb336af2e42d3cd2aabdeaf3de00ddc2c87c621a86564d420789b4a6

  • SSDEEP

    49152:tCwsbCANnKXferL7Vwe/Gg0P+Wh/k7tjrlkWNE3LOEpFRMwX7MLm:Qws2ANnKXOaeOgmh/4wOEpFRpH

Malware Config

Targets

    • Target

      2024-05-29_e1016d3146008b6611fc4f9206f5c37a_icedid

    • Size

      3.8MB

    • MD5

      e1016d3146008b6611fc4f9206f5c37a

    • SHA1

      79e50d5162eb6a09191f0f83666501be45a3e8ab

    • SHA256

      5bcb61e6a7a61aedad37aef9f90dff61074e72212b77257f5ab9d5cac4996e17

    • SHA512

      11f355b2aa3c9845d92c894c2f77e2f311d9bfe863936be9ef00012a9fb17546a73e3dd4bb336af2e42d3cd2aabdeaf3de00ddc2c87c621a86564d420789b4a6

    • SSDEEP

      49152:tCwsbCANnKXferL7Vwe/Gg0P+Wh/k7tjrlkWNE3LOEpFRMwX7MLm:Qws2ANnKXOaeOgmh/4wOEpFRpH

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • UPX dump on OEP (original entry point)

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Tasks