General
-
Target
2024-08-16_63b73ac029ee135ea0b9b94260948fa7_icedid
-
Size
2.3MB
-
Sample
240816-2l82ja1hmd
-
MD5
63b73ac029ee135ea0b9b94260948fa7
-
SHA1
8040b22a4c6d97e1aa96e67de13b9df70a26503c
-
SHA256
8d2ec265a7b59ccc9ff560275beba06961b44d846940bb4f4b9c8e68ef1ced26
-
SHA512
7c5dff6b3528f53554ef9cde11fbb86b5cdf89bd85d52e08d242db60c9f811e6c61e70f2a23ae81cdfae870e0f897ce66e959562633ea7a48937f23e18df6afc
-
SSDEEP
49152:sQZAdVyVT9n/Gg0P+WhomYNvWhLxWDpvjsT+I2O:NGdVyVT9nOgmhr8CLxwpPq
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-16_63b73ac029ee135ea0b9b94260948fa7_icedid.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
2024-08-16_63b73ac029ee135ea0b9b94260948fa7_icedid
-
Size
2.3MB
-
MD5
63b73ac029ee135ea0b9b94260948fa7
-
SHA1
8040b22a4c6d97e1aa96e67de13b9df70a26503c
-
SHA256
8d2ec265a7b59ccc9ff560275beba06961b44d846940bb4f4b9c8e68ef1ced26
-
SHA512
7c5dff6b3528f53554ef9cde11fbb86b5cdf89bd85d52e08d242db60c9f811e6c61e70f2a23ae81cdfae870e0f897ce66e959562633ea7a48937f23e18df6afc
-
SSDEEP
49152:sQZAdVyVT9n/Gg0P+WhomYNvWhLxWDpvjsT+I2O:NGdVyVT9nOgmhr8CLxwpPq
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1