General
-
Target
2025-01-07_59462ba28bd9ceece5f78d41ec638c94_hijackloader_icedid
-
Size
2.6MB
-
Sample
250107-3wfcmsvjaz
-
MD5
59462ba28bd9ceece5f78d41ec638c94
-
SHA1
656febce3d408164f4336c605d52b050dc51edf4
-
SHA256
054bb379ea2cd28bdb38bb668d5d2e930691bfcac45c01eda350aa70cb573ef1
-
SHA512
cef9e6b5c27713943cabdfc53566736507de2e8a4cad7d80ea2ccdf86853c6e8cdac44ebd2c0fff34aa4845b5f702ad6b6fcc66f0f6184971fac25443f2511e0
-
SSDEEP
24576:mCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nH1:mCwsbCANnKXferL7Vwe/Gg0P+WhGL7W
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-07_59462ba28bd9ceece5f78d41ec638c94_hijackloader_icedid.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-07_59462ba28bd9ceece5f78d41ec638c94_hijackloader_icedid
-
Size
2.6MB
-
MD5
59462ba28bd9ceece5f78d41ec638c94
-
SHA1
656febce3d408164f4336c605d52b050dc51edf4
-
SHA256
054bb379ea2cd28bdb38bb668d5d2e930691bfcac45c01eda350aa70cb573ef1
-
SHA512
cef9e6b5c27713943cabdfc53566736507de2e8a4cad7d80ea2ccdf86853c6e8cdac44ebd2c0fff34aa4845b5f702ad6b6fcc66f0f6184971fac25443f2511e0
-
SSDEEP
24576:mCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nH1:mCwsbCANnKXferL7Vwe/Gg0P+WhGL7W
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1