General

  • Target

    2024-09-01_74c768218136f29ee4c6784ba236ec44_hijackloader_icedid

  • Size

    4.6MB

  • Sample

    240901-ke9aaawgld

  • MD5

    74c768218136f29ee4c6784ba236ec44

  • SHA1

    5a40b12bf3d67d5ff7c26cebe9455d0eff617389

  • SHA256

    f92780ddcdb0ff5c0a547ec5c196451deb541b1ccd01af9597e1ad39d66660cb

  • SHA512

    4581f2e4945f9e40e1ee8752394c8badb4e80222821bcecd426f7db8a9d426250b45c4ab359aa2be91051644502c9349b1aa46b42949084725c83fb0b4591704

  • SSDEEP

    49152:PQZAdVyVT9n/Gg0P+WhoIc2bXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8w:oGdVyVT9nOgmhxc2bXsPN5kiQaZ56

Malware Config

Targets

    • Target

      2024-09-01_74c768218136f29ee4c6784ba236ec44_hijackloader_icedid

    • Size

      4.6MB

    • MD5

      74c768218136f29ee4c6784ba236ec44

    • SHA1

      5a40b12bf3d67d5ff7c26cebe9455d0eff617389

    • SHA256

      f92780ddcdb0ff5c0a547ec5c196451deb541b1ccd01af9597e1ad39d66660cb

    • SHA512

      4581f2e4945f9e40e1ee8752394c8badb4e80222821bcecd426f7db8a9d426250b45c4ab359aa2be91051644502c9349b1aa46b42949084725c83fb0b4591704

    • SSDEEP

      49152:PQZAdVyVT9n/Gg0P+WhoIc2bXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8w:oGdVyVT9nOgmhxc2bXsPN5kiQaZ56

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks