General

  • Target

    2024-12-27_5812e0f3650a659f056fa3fcfd95ef21_icedid

  • Size

    2.6MB

  • Sample

    241227-pm3jxsvncw

  • MD5

    5812e0f3650a659f056fa3fcfd95ef21

  • SHA1

    3af7184eae1dab6f927fdd9b712f6e8bc8e497a3

  • SHA256

    fb29ee3098faf75cef0cf481b83c0834637b8e6973b3ee71ef647236f755532e

  • SHA512

    e1f303eeea1596b4b0122c2c2e97718d5a5ddaa3c80705e206460c5c86d9598903d5e5188c7c9dc32f0e65752a391b1d326ce42d169ca8652dd980ebebeddacf

  • SSDEEP

    24576:GCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHt:GCwsbCANnKXferL7Vwe/Gg0P+Wh5+Gu

Malware Config

Targets

    • Target

      2024-12-27_5812e0f3650a659f056fa3fcfd95ef21_icedid

    • Size

      2.6MB

    • MD5

      5812e0f3650a659f056fa3fcfd95ef21

    • SHA1

      3af7184eae1dab6f927fdd9b712f6e8bc8e497a3

    • SHA256

      fb29ee3098faf75cef0cf481b83c0834637b8e6973b3ee71ef647236f755532e

    • SHA512

      e1f303eeea1596b4b0122c2c2e97718d5a5ddaa3c80705e206460c5c86d9598903d5e5188c7c9dc32f0e65752a391b1d326ce42d169ca8652dd980ebebeddacf

    • SSDEEP

      24576:GCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHt:GCwsbCANnKXferL7Vwe/Gg0P+Wh5+Gu

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks