General

  • Target

    2024-12-27_147ccebcc6499cd089505ba3261b194a_icedid

  • Size

    21.0MB

  • Sample

    241227-plgk3avpdm

  • MD5

    147ccebcc6499cd089505ba3261b194a

  • SHA1

    b3f7144abfbe3002f65bb56eadf0fbe75637e6eb

  • SHA256

    81b410f5f02f96319b330882589ed46246581c174e98bd233cc5f1d7fd1ee932

  • SHA512

    5c6a7a80ac79f2af97f16a4714cb82968db9ebca139c02476539899a555ff8e7dfe03ccb26c4b77d9e08bdb0dc5d1669e6b7c3ccac68fb1ba5807e1d84b28f39

  • SSDEEP

    196608:pKXbeO7psJsxMSCi21y0MBLC/M7mwNjYsK0i7HsWxYXLwEGDnUf6xv0bEEH4vsbK:q7q1w5LSHw80PiY5GQSxGE1v1GM

Malware Config

Targets

    • Target

      2024-12-27_147ccebcc6499cd089505ba3261b194a_icedid

    • Size

      21.0MB

    • MD5

      147ccebcc6499cd089505ba3261b194a

    • SHA1

      b3f7144abfbe3002f65bb56eadf0fbe75637e6eb

    • SHA256

      81b410f5f02f96319b330882589ed46246581c174e98bd233cc5f1d7fd1ee932

    • SHA512

      5c6a7a80ac79f2af97f16a4714cb82968db9ebca139c02476539899a555ff8e7dfe03ccb26c4b77d9e08bdb0dc5d1669e6b7c3ccac68fb1ba5807e1d84b28f39

    • SSDEEP

      196608:pKXbeO7psJsxMSCi21y0MBLC/M7mwNjYsK0i7HsWxYXLwEGDnUf6xv0bEEH4vsbK:q7q1w5LSHw80PiY5GQSxGE1v1GM

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks