General
-
Target
2024-08-15_0a22280045e062f49e0d09dd4122d823_hijackloader_icedid
-
Size
2.5MB
-
Sample
240815-ng5awsthrn
-
MD5
0a22280045e062f49e0d09dd4122d823
-
SHA1
d0a251250116cbc07f4bef20706df7a298fa17b5
-
SHA256
28f6377314c05cd63399078a557b9de1072b0ec3fe99ceaae66529769887da47
-
SHA512
6d5a94b85c4a80123de367ca48826ac8064558b5f5f714fcfe41ff82ffb626e79577faf6f56e124f2f8f02b46ca11e91591b9061e091c33ab775f84bbc41102c
-
SSDEEP
49152:UQZAdVyVT9n/Gg0P+Whopmn2NGtt6H3NmDV5MSuuL:FGdVyVT9nOgmhemn2A8d4V5Nz
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-15_0a22280045e062f49e0d09dd4122d823_hijackloader_icedid.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
2024-08-15_0a22280045e062f49e0d09dd4122d823_hijackloader_icedid
-
Size
2.5MB
-
MD5
0a22280045e062f49e0d09dd4122d823
-
SHA1
d0a251250116cbc07f4bef20706df7a298fa17b5
-
SHA256
28f6377314c05cd63399078a557b9de1072b0ec3fe99ceaae66529769887da47
-
SHA512
6d5a94b85c4a80123de367ca48826ac8064558b5f5f714fcfe41ff82ffb626e79577faf6f56e124f2f8f02b46ca11e91591b9061e091c33ab775f84bbc41102c
-
SSDEEP
49152:UQZAdVyVT9n/Gg0P+Whopmn2NGtt6H3NmDV5MSuuL:FGdVyVT9nOgmhemn2A8d4V5Nz
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1