General
-
Target
2025-01-14_2ea92aef62e2e3442061bfac63200d82_icedid_ramnit_ruftar_strictor
-
Size
7.7MB
-
Sample
250114-tyflraspev
-
MD5
2ea92aef62e2e3442061bfac63200d82
-
SHA1
54741ea20f2f8f195383bb62e9ceb5c21375fa64
-
SHA256
3cb768625bc63e2075e7f07e10a06822aaabb858abcfd3cc3ee44b1246c95162
-
SHA512
2f65089554f8b979266ca559c98949906520c0544079217776d4b6bbef73040108aa44d79e2424deb252bf7eb35a8ef600cf0f18046a50a4c68bbafa01038f3b
-
SSDEEP
49152:K3ORwRazeYFRu6cjZ72WIJfJnugVaryxMNdPyORo7veIAe+/rvATWFNyALrcVMdH:Z+6/9KN9ie3rcVZAnDhKy
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-14_2ea92aef62e2e3442061bfac63200d82_icedid_ramnit_ruftar_strictor.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-14_2ea92aef62e2e3442061bfac63200d82_icedid_ramnit_ruftar_strictor
-
Size
7.7MB
-
MD5
2ea92aef62e2e3442061bfac63200d82
-
SHA1
54741ea20f2f8f195383bb62e9ceb5c21375fa64
-
SHA256
3cb768625bc63e2075e7f07e10a06822aaabb858abcfd3cc3ee44b1246c95162
-
SHA512
2f65089554f8b979266ca559c98949906520c0544079217776d4b6bbef73040108aa44d79e2424deb252bf7eb35a8ef600cf0f18046a50a4c68bbafa01038f3b
-
SSDEEP
49152:K3ORwRazeYFRu6cjZ72WIJfJnugVaryxMNdPyORo7veIAe+/rvATWFNyALrcVMdH:Z+6/9KN9ie3rcVZAnDhKy
-
Ramnit family
-
Drops file in Drivers directory
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-