General
-
Target
2024-09-07_6f482d0de7382abf9ec211cf580bfd99_hijackloader_icedid
-
Size
4.6MB
-
Sample
240907-ej3qeatgmd
-
MD5
6f482d0de7382abf9ec211cf580bfd99
-
SHA1
e79d5eebbd5dce65f7ed462fe749c09e375e940b
-
SHA256
e59da1e8275ceb002947cf23909fbd23d93b1db5d7e3c79fd84af5d964f3b576
-
SHA512
aae43d4550e8e8046a97365c325864ae49ac34fd906ae431b1c089803eb121e10cd8b914cf7208f3610616ea915433b0d5ad05881c69ac3f707304bf2965a6ea
-
SSDEEP
49152:zCwsbCANnKXferL7Vwe/Gg0P+WhrgWW1o/5+0vY3u6c20LAonnkeJ9EWW3:mws2ANnKXOaeOgmhxWa/k0vjAoke9W3
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_6f482d0de7382abf9ec211cf580bfd99_hijackloader_icedid.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
2024-09-07_6f482d0de7382abf9ec211cf580bfd99_hijackloader_icedid
-
Size
4.6MB
-
MD5
6f482d0de7382abf9ec211cf580bfd99
-
SHA1
e79d5eebbd5dce65f7ed462fe749c09e375e940b
-
SHA256
e59da1e8275ceb002947cf23909fbd23d93b1db5d7e3c79fd84af5d964f3b576
-
SHA512
aae43d4550e8e8046a97365c325864ae49ac34fd906ae431b1c089803eb121e10cd8b914cf7208f3610616ea915433b0d5ad05881c69ac3f707304bf2965a6ea
-
SSDEEP
49152:zCwsbCANnKXferL7Vwe/Gg0P+WhrgWW1o/5+0vY3u6c20LAonnkeJ9EWW3:mws2ANnKXOaeOgmhxWa/k0vjAoke9W3
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1