General
-
Target
2025-01-02_fea6f9628ae86ac579d7825bc27b024f_icedid_luca-stealer
-
Size
2.8MB
-
Sample
250102-p8c66awjbj
-
MD5
fea6f9628ae86ac579d7825bc27b024f
-
SHA1
b2fd44eee3bfdaaec7f85d2d1ef3e9ca551deeb4
-
SHA256
fc01721bcb5e24e0a24764fa0fc05b300c878bef3cd662c2c20299722fe75a51
-
SHA512
0ebc800ade9cd746fe8b9f56b3b9cf9581f290f089b74241f74bd38b1a80cb4f47e8b314903c0eb2a40ed235b4610d3034a9bf043bd50aaa5dd662b5d5718b5c
-
SSDEEP
24576:bCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHI:bCwsbCANnKXferL7Vwe/Gg0P+Wh1Y+x
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-02_fea6f9628ae86ac579d7825bc27b024f_icedid_luca-stealer.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2025-01-02_fea6f9628ae86ac579d7825bc27b024f_icedid_luca-stealer
-
Size
2.8MB
-
MD5
fea6f9628ae86ac579d7825bc27b024f
-
SHA1
b2fd44eee3bfdaaec7f85d2d1ef3e9ca551deeb4
-
SHA256
fc01721bcb5e24e0a24764fa0fc05b300c878bef3cd662c2c20299722fe75a51
-
SHA512
0ebc800ade9cd746fe8b9f56b3b9cf9581f290f089b74241f74bd38b1a80cb4f47e8b314903c0eb2a40ed235b4610d3034a9bf043bd50aaa5dd662b5d5718b5c
-
SSDEEP
24576:bCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHI:bCwsbCANnKXferL7Vwe/Gg0P+Wh1Y+x
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1