General
-
Target
2025-01-07_6064f0bb931e29a7ff8163c4361ca995_hijackloader_icedid
-
Size
3.0MB
-
Sample
250107-3wvgkawphl
-
MD5
6064f0bb931e29a7ff8163c4361ca995
-
SHA1
16c1e44bf065c24527efcc5f60ba033b6ba7b53b
-
SHA256
ad12d1bbede7df776aa9a547fe1a0be6a9e8bc0ac9b70ea106004026a5d8f7d4
-
SHA512
694da07e3d3147e3995d7668ded496aafe5d62e58e9632e8fabac6a341b1c345bedbf8c4f7fd60999f978fb7e9d0ac7a86f2701a2aade7d7d7c0533808f1c371
-
SSDEEP
49152:mCwsbCANnKXferL7Vwe/Gg0P+WhGL0IXWqK:Rws2ANnKXOaeOgmhGL9Wq
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-07_6064f0bb931e29a7ff8163c4361ca995_hijackloader_icedid.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-07_6064f0bb931e29a7ff8163c4361ca995_hijackloader_icedid
-
Size
3.0MB
-
MD5
6064f0bb931e29a7ff8163c4361ca995
-
SHA1
16c1e44bf065c24527efcc5f60ba033b6ba7b53b
-
SHA256
ad12d1bbede7df776aa9a547fe1a0be6a9e8bc0ac9b70ea106004026a5d8f7d4
-
SHA512
694da07e3d3147e3995d7668ded496aafe5d62e58e9632e8fabac6a341b1c345bedbf8c4f7fd60999f978fb7e9d0ac7a86f2701a2aade7d7d7c0533808f1c371
-
SSDEEP
49152:mCwsbCANnKXferL7Vwe/Gg0P+WhGL0IXWqK:Rws2ANnKXOaeOgmhGL9Wq
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1