General

  • Target

    2025-01-02_fea6f9628ae86ac579d7825bc27b024f_icedid_luca-stealer

  • Size

    2.8MB

  • Sample

    250102-p8c66awjbj

  • MD5

    fea6f9628ae86ac579d7825bc27b024f

  • SHA1

    b2fd44eee3bfdaaec7f85d2d1ef3e9ca551deeb4

  • SHA256

    fc01721bcb5e24e0a24764fa0fc05b300c878bef3cd662c2c20299722fe75a51

  • SHA512

    0ebc800ade9cd746fe8b9f56b3b9cf9581f290f089b74241f74bd38b1a80cb4f47e8b314903c0eb2a40ed235b4610d3034a9bf043bd50aaa5dd662b5d5718b5c

  • SSDEEP

    24576:bCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHI:bCwsbCANnKXferL7Vwe/Gg0P+Wh1Y+x

Malware Config

Targets

    • Target

      2025-01-02_fea6f9628ae86ac579d7825bc27b024f_icedid_luca-stealer

    • Size

      2.8MB

    • MD5

      fea6f9628ae86ac579d7825bc27b024f

    • SHA1

      b2fd44eee3bfdaaec7f85d2d1ef3e9ca551deeb4

    • SHA256

      fc01721bcb5e24e0a24764fa0fc05b300c878bef3cd662c2c20299722fe75a51

    • SHA512

      0ebc800ade9cd746fe8b9f56b3b9cf9581f290f089b74241f74bd38b1a80cb4f47e8b314903c0eb2a40ed235b4610d3034a9bf043bd50aaa5dd662b5d5718b5c

    • SSDEEP

      24576:bCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHI:bCwsbCANnKXferL7Vwe/Gg0P+Wh1Y+x

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks