General
-
Target
2024-12-27_cbd023437dd77fcdc4fbe11263ff7311_hijackloader_icedid
-
Size
3.1MB
-
Sample
241227-pp8tqavpgq
-
MD5
cbd023437dd77fcdc4fbe11263ff7311
-
SHA1
457248029e20364f39fa93d1e692ba9ad6865675
-
SHA256
29177006c04315ec72b6eefc7be1fc2f921d9b5e5ae207f94a3ccd14ff7970b5
-
SHA512
ac9332f0cb029286f2f0523c2975079c125d9fb1e4f5c2c9bf380c4108ad2e88134fe5ba01605380cbb6383103f19dcd76f2f0f4b5c07067cfae10e5e0fb4590
-
SSDEEP
49152:LCwsbCANnKXferL7Vwe/Gg0P+WhCg4ROEU3:Ows2ANnKXOaeOgmhCg4s7
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-27_cbd023437dd77fcdc4fbe11263ff7311_hijackloader_icedid.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-27_cbd023437dd77fcdc4fbe11263ff7311_hijackloader_icedid
-
Size
3.1MB
-
MD5
cbd023437dd77fcdc4fbe11263ff7311
-
SHA1
457248029e20364f39fa93d1e692ba9ad6865675
-
SHA256
29177006c04315ec72b6eefc7be1fc2f921d9b5e5ae207f94a3ccd14ff7970b5
-
SHA512
ac9332f0cb029286f2f0523c2975079c125d9fb1e4f5c2c9bf380c4108ad2e88134fe5ba01605380cbb6383103f19dcd76f2f0f4b5c07067cfae10e5e0fb4590
-
SSDEEP
49152:LCwsbCANnKXferL7Vwe/Gg0P+WhCg4ROEU3:Ows2ANnKXOaeOgmhCg4s7
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1