General
-
Target
2024-08-15_3e82a312d7a08e15bec64baab27f1e7f_hijackloader_icedid
-
Size
4.7MB
-
Sample
240815-nkk2eszbpc
-
MD5
3e82a312d7a08e15bec64baab27f1e7f
-
SHA1
5cc3a409b2ba22bdeef494bf27feac357855dc97
-
SHA256
9b0a245698de035c6c7c8d9924f2eb1afbcf06eb4cbac0a0b8cfd7f2417aeb13
-
SHA512
4b551bf5efa4d4a16d8a911a53ba333502c748acaaaa5d541c54fc5450b64795749cd06184bfaff396bede0f7ac1bd098342d058ddce32284a5c94073a07fd1e
-
SSDEEP
98304:wZJt4HINy2LkGf9BsQHdVblJwzAkbxzpfxpaVR:GiINy2Lkw9BsqiAkbx1GR
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-15_3e82a312d7a08e15bec64baab27f1e7f_hijackloader_icedid.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
2024-08-15_3e82a312d7a08e15bec64baab27f1e7f_hijackloader_icedid
-
Size
4.7MB
-
MD5
3e82a312d7a08e15bec64baab27f1e7f
-
SHA1
5cc3a409b2ba22bdeef494bf27feac357855dc97
-
SHA256
9b0a245698de035c6c7c8d9924f2eb1afbcf06eb4cbac0a0b8cfd7f2417aeb13
-
SHA512
4b551bf5efa4d4a16d8a911a53ba333502c748acaaaa5d541c54fc5450b64795749cd06184bfaff396bede0f7ac1bd098342d058ddce32284a5c94073a07fd1e
-
SSDEEP
98304:wZJt4HINy2LkGf9BsQHdVblJwzAkbxzpfxpaVR:GiINy2Lkw9BsqiAkbx1GR
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1