General

  • Target

    2024-08-16_f6c5f5b5fc64b4f14f10be2566b5a59e_icedid

  • Size

    2.2MB

  • Sample

    240816-3tdq2avcqd

  • MD5

    f6c5f5b5fc64b4f14f10be2566b5a59e

  • SHA1

    5be338cf3c5d7bfa51a7620351a261a8ba92d5b6

  • SHA256

    f1bafec0c8da9b803264fc872f2c7b7aba4261bad02d267c1ebd6d8274d7f376

  • SHA512

    cd61439c8ec936aa576da306d8a91f65d24a3dd32bcb1b6027c4949155cfa9060d53c25bd1feb7d6e7d7d7f0e35e4fd1bf9f79dcbf53457322bb7e5c579645a8

  • SSDEEP

    49152:gQZAdVyVT9n/Gg0P+Whoi4Ks3P5x2G04Ks3P5x2oK:pGdVyVT9nOgmhX4Ks3P5x2G04Ks3P5xq

Malware Config

Targets

    • Target

      2024-08-16_f6c5f5b5fc64b4f14f10be2566b5a59e_icedid

    • Size

      2.2MB

    • MD5

      f6c5f5b5fc64b4f14f10be2566b5a59e

    • SHA1

      5be338cf3c5d7bfa51a7620351a261a8ba92d5b6

    • SHA256

      f1bafec0c8da9b803264fc872f2c7b7aba4261bad02d267c1ebd6d8274d7f376

    • SHA512

      cd61439c8ec936aa576da306d8a91f65d24a3dd32bcb1b6027c4949155cfa9060d53c25bd1feb7d6e7d7d7f0e35e4fd1bf9f79dcbf53457322bb7e5c579645a8

    • SSDEEP

      49152:gQZAdVyVT9n/Gg0P+Whoi4Ks3P5x2G04Ks3P5x2oK:pGdVyVT9nOgmhX4Ks3P5x2G04Ks3P5xq

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks