General
-
Target
2025-01-06_f0e20bf19cbd63eaa6f79d7082d42637_icedid
-
Size
2.7MB
-
Sample
250106-eztsfayken
-
MD5
f0e20bf19cbd63eaa6f79d7082d42637
-
SHA1
2c71b1bf045be8dbedc889e080fa161138f9e5c0
-
SHA256
dfe11486c8ce95299b14b86ba7d7257b062a3e06bd701dd824abe8eda964114a
-
SHA512
747c61fd21d9ed479a256a4e6959d41239e64ee15187d1c1e0de0b46d4f06e46808fb2bf2d35241b3d33f19b49db9221d3e80d7546b513ac22bcc5da266c4fd6
-
SSDEEP
49152:iQZAdVyVT9n/Gg0P+WhoXSiNhVSBsvPTMlLqR6N4waDWSVE3tMx3FE1S0W:7GdVyVT9nOgmhCSkhVSdqR6/SA
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-06_f0e20bf19cbd63eaa6f79d7082d42637_icedid.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
2025-01-06_f0e20bf19cbd63eaa6f79d7082d42637_icedid
-
Size
2.7MB
-
MD5
f0e20bf19cbd63eaa6f79d7082d42637
-
SHA1
2c71b1bf045be8dbedc889e080fa161138f9e5c0
-
SHA256
dfe11486c8ce95299b14b86ba7d7257b062a3e06bd701dd824abe8eda964114a
-
SHA512
747c61fd21d9ed479a256a4e6959d41239e64ee15187d1c1e0de0b46d4f06e46808fb2bf2d35241b3d33f19b49db9221d3e80d7546b513ac22bcc5da266c4fd6
-
SSDEEP
49152:iQZAdVyVT9n/Gg0P+WhoXSiNhVSBsvPTMlLqR6N4waDWSVE3tMx3FE1S0W:7GdVyVT9nOgmhCSkhVSdqR6/SA
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1