General

  • Target

    2025-01-08_b559cfa3880d96173048178840a2f2f4_hijackloader_icedid_luca-stealer

  • Size

    2.6MB

  • Sample

    250108-av5lxswkfv

  • MD5

    b559cfa3880d96173048178840a2f2f4

  • SHA1

    9d99f8bb9269ed89b8bb421d601e22868bbe1f98

  • SHA256

    a8327dc6b85fba84c9b2ea3a816a4489d7a1dbd9c18e815251f84507c59c5e61

  • SHA512

    00a1cd2eaa3fe8c4f1c54ae7ec39b0cf9bcde9a2f07899ab7cb274d732f6f419ad2e18627e200781b2a53a9a59cdf565b3415e62bd3553604ed7bc79e7499e77

  • SSDEEP

    49152:mCwsbCANnKXferL7Vwe/Gg0P+WhGLpOqo:Rws2ANnKXOaeOgmhGLpO

Malware Config

Targets

    • Target

      2025-01-08_b559cfa3880d96173048178840a2f2f4_hijackloader_icedid_luca-stealer

    • Size

      2.6MB

    • MD5

      b559cfa3880d96173048178840a2f2f4

    • SHA1

      9d99f8bb9269ed89b8bb421d601e22868bbe1f98

    • SHA256

      a8327dc6b85fba84c9b2ea3a816a4489d7a1dbd9c18e815251f84507c59c5e61

    • SHA512

      00a1cd2eaa3fe8c4f1c54ae7ec39b0cf9bcde9a2f07899ab7cb274d732f6f419ad2e18627e200781b2a53a9a59cdf565b3415e62bd3553604ed7bc79e7499e77

    • SSDEEP

      49152:mCwsbCANnKXferL7Vwe/Gg0P+WhGLpOqo:Rws2ANnKXOaeOgmhGLpO

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks