General
-
Target
2024-12-27_cfe84e0eafe0c831e82803a8b2b8395a_icedid
-
Size
33.3MB
-
Sample
241227-pqebhavphj
-
MD5
cfe84e0eafe0c831e82803a8b2b8395a
-
SHA1
322a2390c75b0f2d393b87084fc55111514962ec
-
SHA256
d4720df527c5d0a70bc7c1abeb33f58b43c8d682b1546de754c6578308b90422
-
SHA512
4e88fbee75ed2b7294b516f00c5844af07aa928c62525986bc68b151bfbfc177d632ca40fb2be9635a026cfd99ba5b234bcd47bdfc220d43bc6535fdb49c9245
-
SSDEEP
393216:p7H3D7maEJPOG82YmxZotG82Y7BIbc9dgwRY21Ny3krylubte3aDiQIg7ajDxBnq:NXmaujBO+21Nojfq
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-27_cfe84e0eafe0c831e82803a8b2b8395a_icedid.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-27_cfe84e0eafe0c831e82803a8b2b8395a_icedid
-
Size
33.3MB
-
MD5
cfe84e0eafe0c831e82803a8b2b8395a
-
SHA1
322a2390c75b0f2d393b87084fc55111514962ec
-
SHA256
d4720df527c5d0a70bc7c1abeb33f58b43c8d682b1546de754c6578308b90422
-
SHA512
4e88fbee75ed2b7294b516f00c5844af07aa928c62525986bc68b151bfbfc177d632ca40fb2be9635a026cfd99ba5b234bcd47bdfc220d43bc6535fdb49c9245
-
SSDEEP
393216:p7H3D7maEJPOG82YmxZotG82Y7BIbc9dgwRY21Ny3krylubte3aDiQIg7ajDxBnq:NXmaujBO+21Nojfq
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1