General

  • Target

    2024-08-15_0a22280045e062f49e0d09dd4122d823_hijackloader_icedid

  • Size

    2.5MB

  • Sample

    240815-ng5awsthrn

  • MD5

    0a22280045e062f49e0d09dd4122d823

  • SHA1

    d0a251250116cbc07f4bef20706df7a298fa17b5

  • SHA256

    28f6377314c05cd63399078a557b9de1072b0ec3fe99ceaae66529769887da47

  • SHA512

    6d5a94b85c4a80123de367ca48826ac8064558b5f5f714fcfe41ff82ffb626e79577faf6f56e124f2f8f02b46ca11e91591b9061e091c33ab775f84bbc41102c

  • SSDEEP

    49152:UQZAdVyVT9n/Gg0P+Whopmn2NGtt6H3NmDV5MSuuL:FGdVyVT9nOgmhemn2A8d4V5Nz

Malware Config

Targets

    • Target

      2024-08-15_0a22280045e062f49e0d09dd4122d823_hijackloader_icedid

    • Size

      2.5MB

    • MD5

      0a22280045e062f49e0d09dd4122d823

    • SHA1

      d0a251250116cbc07f4bef20706df7a298fa17b5

    • SHA256

      28f6377314c05cd63399078a557b9de1072b0ec3fe99ceaae66529769887da47

    • SHA512

      6d5a94b85c4a80123de367ca48826ac8064558b5f5f714fcfe41ff82ffb626e79577faf6f56e124f2f8f02b46ca11e91591b9061e091c33ab775f84bbc41102c

    • SSDEEP

      49152:UQZAdVyVT9n/Gg0P+Whopmn2NGtt6H3NmDV5MSuuL:FGdVyVT9nOgmhemn2A8d4V5Nz

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks