General
-
Target
2024-08-14_b18f5ea689b8710e0a549e9de8a7c4d3_icedid
-
Size
2.5MB
-
Sample
240814-sycdnazdph
-
MD5
b18f5ea689b8710e0a549e9de8a7c4d3
-
SHA1
8109ce1f83168eab954cd3d84004afcfa8f14836
-
SHA256
23e982b331b4564be5a058e1c70a6ff8a671cd2ae4cd3941f2f645e512310747
-
SHA512
6f132994fd3fc010677ba3933cfd918635e5aba389334b30bdc9b59672ceb6f6349e00f6339ec659318bccbdc96af0e08d8ecaad2e015035f208005c5bb24e84
-
SSDEEP
49152:PQZAdVyVT9n/Gg0P+WhoFYeuvWhLxWDpvjsT+I2O:oGdVyVT9nOgmhYbuCLxwpPq
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-14_b18f5ea689b8710e0a549e9de8a7c4d3_icedid.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
2024-08-14_b18f5ea689b8710e0a549e9de8a7c4d3_icedid
-
Size
2.5MB
-
MD5
b18f5ea689b8710e0a549e9de8a7c4d3
-
SHA1
8109ce1f83168eab954cd3d84004afcfa8f14836
-
SHA256
23e982b331b4564be5a058e1c70a6ff8a671cd2ae4cd3941f2f645e512310747
-
SHA512
6f132994fd3fc010677ba3933cfd918635e5aba389334b30bdc9b59672ceb6f6349e00f6339ec659318bccbdc96af0e08d8ecaad2e015035f208005c5bb24e84
-
SSDEEP
49152:PQZAdVyVT9n/Gg0P+WhoFYeuvWhLxWDpvjsT+I2O:oGdVyVT9nOgmhYbuCLxwpPq
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1