General
-
Target
2024-08-18_4e5acb9dcabab150671cd1315fa6a554_hijackloader_icedid
-
Size
2.8MB
-
Sample
240818-efwspatflg
-
MD5
4e5acb9dcabab150671cd1315fa6a554
-
SHA1
cdf40d693972f8866a70067bd23ba6441b9401fe
-
SHA256
2236df5f4eff2ab37811e57820a3cc334cf8f92d9babcd7d5f76c08c6eb43b9c
-
SHA512
3dfacb9f5a4e7e98e54c5740577671af823c40d6ffdd7b1e9bbff2bd4b6175c77ec0617a61f206dfd18264d81621982d968c1f9ca539d175097003a6e3154348
-
SSDEEP
49152:pCwsbCANnKXferL7Vwe/Gg0P+WhU6goMjEm1:Ews2ANnKXOaeOgmhtgo
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-18_4e5acb9dcabab150671cd1315fa6a554_hijackloader_icedid.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
2024-08-18_4e5acb9dcabab150671cd1315fa6a554_hijackloader_icedid
-
Size
2.8MB
-
MD5
4e5acb9dcabab150671cd1315fa6a554
-
SHA1
cdf40d693972f8866a70067bd23ba6441b9401fe
-
SHA256
2236df5f4eff2ab37811e57820a3cc334cf8f92d9babcd7d5f76c08c6eb43b9c
-
SHA512
3dfacb9f5a4e7e98e54c5740577671af823c40d6ffdd7b1e9bbff2bd4b6175c77ec0617a61f206dfd18264d81621982d968c1f9ca539d175097003a6e3154348
-
SSDEEP
49152:pCwsbCANnKXferL7Vwe/Gg0P+WhU6goMjEm1:Ews2ANnKXOaeOgmhtgo
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1