General

  • Target

    2024-08-14_b18f5ea689b8710e0a549e9de8a7c4d3_icedid

  • Size

    2.5MB

  • Sample

    240814-sycdnazdph

  • MD5

    b18f5ea689b8710e0a549e9de8a7c4d3

  • SHA1

    8109ce1f83168eab954cd3d84004afcfa8f14836

  • SHA256

    23e982b331b4564be5a058e1c70a6ff8a671cd2ae4cd3941f2f645e512310747

  • SHA512

    6f132994fd3fc010677ba3933cfd918635e5aba389334b30bdc9b59672ceb6f6349e00f6339ec659318bccbdc96af0e08d8ecaad2e015035f208005c5bb24e84

  • SSDEEP

    49152:PQZAdVyVT9n/Gg0P+WhoFYeuvWhLxWDpvjsT+I2O:oGdVyVT9nOgmhYbuCLxwpPq

Malware Config

Targets

    • Target

      2024-08-14_b18f5ea689b8710e0a549e9de8a7c4d3_icedid

    • Size

      2.5MB

    • MD5

      b18f5ea689b8710e0a549e9de8a7c4d3

    • SHA1

      8109ce1f83168eab954cd3d84004afcfa8f14836

    • SHA256

      23e982b331b4564be5a058e1c70a6ff8a671cd2ae4cd3941f2f645e512310747

    • SHA512

      6f132994fd3fc010677ba3933cfd918635e5aba389334b30bdc9b59672ceb6f6349e00f6339ec659318bccbdc96af0e08d8ecaad2e015035f208005c5bb24e84

    • SSDEEP

      49152:PQZAdVyVT9n/Gg0P+WhoFYeuvWhLxWDpvjsT+I2O:oGdVyVT9nOgmhYbuCLxwpPq

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks