General
-
Target
2024-08-31_1cf74bf912e572885e40b957d074ec8a_hijackloader_icedid
-
Size
4.8MB
-
Sample
240831-ggvywsydrg
-
MD5
1cf74bf912e572885e40b957d074ec8a
-
SHA1
59aabcef8a7d06a1d7f63b3c6189a36e953a80ae
-
SHA256
d8eb06c79e52a1907e95f76c91d18aa99876ebd8075ed525a084ee7544238f67
-
SHA512
17b3dae97cd68eeae11dd22119070f092aaa94c41bb5f3c4644140e7a41f078c4e230716904358f7f53cf7bbb704b0dcdabc3e6118781576b303668d78d71920
-
SSDEEP
49152:zQZAdVyVT9n/Gg0P+WhoNbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8b8R:0GdVyVT9nOgmhabXsPN5kiQaZ56
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-31_1cf74bf912e572885e40b957d074ec8a_hijackloader_icedid.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
2024-08-31_1cf74bf912e572885e40b957d074ec8a_hijackloader_icedid
-
Size
4.8MB
-
MD5
1cf74bf912e572885e40b957d074ec8a
-
SHA1
59aabcef8a7d06a1d7f63b3c6189a36e953a80ae
-
SHA256
d8eb06c79e52a1907e95f76c91d18aa99876ebd8075ed525a084ee7544238f67
-
SHA512
17b3dae97cd68eeae11dd22119070f092aaa94c41bb5f3c4644140e7a41f078c4e230716904358f7f53cf7bbb704b0dcdabc3e6118781576b303668d78d71920
-
SSDEEP
49152:zQZAdVyVT9n/Gg0P+WhoNbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8b8R:0GdVyVT9nOgmhabXsPN5kiQaZ56
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1