General

  • Target

    2024-09-30_32a25c0bb4de8097cb80ad9abb80a025_hijackloader_icedid

  • Size

    3.8MB

  • Sample

    240930-lr8pysycjq

  • MD5

    32a25c0bb4de8097cb80ad9abb80a025

  • SHA1

    f0a26c8c93dd8cc55df0dfbd8fd7cba0be500f69

  • SHA256

    a2ba467e41b19605e29feece3497b5c764a28e2ba69f1e1cf842908d0da570c9

  • SHA512

    38c77558e32da9c2cd68c7a51124b6af9f95dbc9b887967a0f07ab25b1d7566e4582e5fd8dabf7e42c92518a1918e13ee340c66e8912e83e3f12411436a879f3

  • SSDEEP

    49152:I09XJt4HIN2H2tFvduySFD6GPAnO2nABGt4IdjWx8Uh3ToaG4VbUVfQ25iBxp34Z:tZJt4HINy2Lkp9mnCqt6oabOV

Malware Config

Targets

    • Target

      2024-09-30_32a25c0bb4de8097cb80ad9abb80a025_hijackloader_icedid

    • Size

      3.8MB

    • MD5

      32a25c0bb4de8097cb80ad9abb80a025

    • SHA1

      f0a26c8c93dd8cc55df0dfbd8fd7cba0be500f69

    • SHA256

      a2ba467e41b19605e29feece3497b5c764a28e2ba69f1e1cf842908d0da570c9

    • SHA512

      38c77558e32da9c2cd68c7a51124b6af9f95dbc9b887967a0f07ab25b1d7566e4582e5fd8dabf7e42c92518a1918e13ee340c66e8912e83e3f12411436a879f3

    • SSDEEP

      49152:I09XJt4HIN2H2tFvduySFD6GPAnO2nABGt4IdjWx8Uh3ToaG4VbUVfQ25iBxp34Z:tZJt4HINy2Lkp9mnCqt6oabOV

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks