General
-
Target
2024-11-02_3755a9ec555396d5f6bc94bc44ad540a_hacktools_icedid
-
Size
27.6MB
-
Sample
241102-vyr58a1clp
-
MD5
3755a9ec555396d5f6bc94bc44ad540a
-
SHA1
517f028551edd6a8f67836fe9f643b1a29431818
-
SHA256
b0c045960c3289a7584d8f8c5ea14c74fec3eed6d055fa924c4cfeecc44436c2
-
SHA512
ea079199caefbb0f811ebc9c421fd8e574a35d8c457899fae8a37463316726d9c4ec37192c1ce9d482b0a904851de12e6218338b0aa32f7af3dace5f8f380734
-
SSDEEP
393216:K79D8rI+qJgzxLW6tjgvEPUfqMwWzV9nB4qjY5sBpVGh5Qh/0wUq7og+i:6lcNjk+hPUJzDWqosLVGLFwhz+i
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-02_3755a9ec555396d5f6bc94bc44ad540a_hacktools_icedid.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-11-02_3755a9ec555396d5f6bc94bc44ad540a_hacktools_icedid
-
Size
27.6MB
-
MD5
3755a9ec555396d5f6bc94bc44ad540a
-
SHA1
517f028551edd6a8f67836fe9f643b1a29431818
-
SHA256
b0c045960c3289a7584d8f8c5ea14c74fec3eed6d055fa924c4cfeecc44436c2
-
SHA512
ea079199caefbb0f811ebc9c421fd8e574a35d8c457899fae8a37463316726d9c4ec37192c1ce9d482b0a904851de12e6218338b0aa32f7af3dace5f8f380734
-
SSDEEP
393216:K79D8rI+qJgzxLW6tjgvEPUfqMwWzV9nB4qjY5sBpVGh5Qh/0wUq7og+i:6lcNjk+hPUJzDWqosLVGLFwhz+i
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1