General

  • Target

    2024-08-14_662169b8e34ef78bc64049c2a3777ec1_icedid_nymaim

  • Size

    6.1MB

  • Sample

    240814-samjqataql

  • MD5

    662169b8e34ef78bc64049c2a3777ec1

  • SHA1

    cf45f8f658c95506bb67cf2114d540417a0065a2

  • SHA256

    24363247ec1a5c97dc2aff3823a54d975a8e6e90fb951422f363de93032362b2

  • SHA512

    7047f44af013c0dc4372f8f2701e754f2d134c1d9a2dcadcaeba9da266322018a2af9fa95822c7e698a512e9fb03238b7251e15db86bdb862832000018b1c548

  • SSDEEP

    98304:qGdVyVT9nOgmh+5jMtzO12sS309zbfhJq6dPnRdm/5HivOC:ZWT9nO7cszxc9zbP9dPRdq8

Malware Config

Targets

    • Target

      2024-08-14_662169b8e34ef78bc64049c2a3777ec1_icedid_nymaim

    • Size

      6.1MB

    • MD5

      662169b8e34ef78bc64049c2a3777ec1

    • SHA1

      cf45f8f658c95506bb67cf2114d540417a0065a2

    • SHA256

      24363247ec1a5c97dc2aff3823a54d975a8e6e90fb951422f363de93032362b2

    • SHA512

      7047f44af013c0dc4372f8f2701e754f2d134c1d9a2dcadcaeba9da266322018a2af9fa95822c7e698a512e9fb03238b7251e15db86bdb862832000018b1c548

    • SSDEEP

      98304:qGdVyVT9nOgmh+5jMtzO12sS309zbfhJq6dPnRdm/5HivOC:ZWT9nO7cszxc9zbP9dPRdq8

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks