General
-
Target
2025-01-14_0b8cd5cc5f79f82fc95da3030b9d4012_icedid_ramnit_ruftar_strictor
-
Size
7.7MB
-
Sample
250114-tp9hgasnbz
-
MD5
0b8cd5cc5f79f82fc95da3030b9d4012
-
SHA1
50c6f7bd9609790a9d41e1b3cfc5e91c1a69d6b3
-
SHA256
763626966dbd96bed7bc2aa5e3ab58e3302b973925f49ece644ccacb90aa4119
-
SHA512
b9d8655abfccacde0df1771084b4adbb7266fe1b963f7a8dd0f0750e83d6f00df094dfe3d31a7e6f3773bcd247c9853b9b8dfea0ce3e23992cc96dfded9606b7
-
SSDEEP
49152:J70vVrYK8m0TzBNMFcUVcAYXnGYXPNd2kala+yihdXAF/edvoRFRh1Z+WD14gkz8:JwdrytXlposN/I83HpR7h5u
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-14_0b8cd5cc5f79f82fc95da3030b9d4012_icedid_ramnit_ruftar_strictor.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2025-01-14_0b8cd5cc5f79f82fc95da3030b9d4012_icedid_ramnit_ruftar_strictor
-
Size
7.7MB
-
MD5
0b8cd5cc5f79f82fc95da3030b9d4012
-
SHA1
50c6f7bd9609790a9d41e1b3cfc5e91c1a69d6b3
-
SHA256
763626966dbd96bed7bc2aa5e3ab58e3302b973925f49ece644ccacb90aa4119
-
SHA512
b9d8655abfccacde0df1771084b4adbb7266fe1b963f7a8dd0f0750e83d6f00df094dfe3d31a7e6f3773bcd247c9853b9b8dfea0ce3e23992cc96dfded9606b7
-
SSDEEP
49152:J70vVrYK8m0TzBNMFcUVcAYXnGYXPNd2kala+yihdXAF/edvoRFRh1Z+WD14gkz8:JwdrytXlposN/I83HpR7h5u
-
Ramnit family
-
Drops file in Drivers directory
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-