General

  • Target

    2024-11-14_64fb8213dd0b059147e3fb0e1b7caf64_hijackloader_icedid_luca-stealer

  • Size

    4.4MB

  • Sample

    241114-lryjzsxdpj

  • MD5

    64fb8213dd0b059147e3fb0e1b7caf64

  • SHA1

    52064945e1381eb65739cb82fd031410daa3a095

  • SHA256

    94f91c8f8d82ab66f0dd9cd6de802f2779281c7f9d5811afe8279f59213cb571

  • SHA512

    d42d28c66c1f8a6e560750650ff31ea9f4c4b60540fd4cbe0ad9dd1201264a3a411ce1d328bc125df4159b5125800e53e7b80c06e84be14321cab229deb8b048

  • SSDEEP

    49152:IYREXSVMDi3Rx/bXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8b8ITDnl27z:J2SVMD8T/bXsPN5kiQaZ56

Malware Config

Targets

    • Target

      2024-11-14_64fb8213dd0b059147e3fb0e1b7caf64_hijackloader_icedid_luca-stealer

    • Size

      4.4MB

    • MD5

      64fb8213dd0b059147e3fb0e1b7caf64

    • SHA1

      52064945e1381eb65739cb82fd031410daa3a095

    • SHA256

      94f91c8f8d82ab66f0dd9cd6de802f2779281c7f9d5811afe8279f59213cb571

    • SHA512

      d42d28c66c1f8a6e560750650ff31ea9f4c4b60540fd4cbe0ad9dd1201264a3a411ce1d328bc125df4159b5125800e53e7b80c06e84be14321cab229deb8b048

    • SSDEEP

      49152:IYREXSVMDi3Rx/bXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8b8ITDnl27z:J2SVMD8T/bXsPN5kiQaZ56

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks