General
-
Target
2025-01-14_9e5e962c28d2b4bb05a5c27697415866_icedid_ramnit_ruftar_strictor
-
Size
7.7MB
-
Sample
250114-vgm5yawjbj
-
MD5
9e5e962c28d2b4bb05a5c27697415866
-
SHA1
3719d116923c7b9433cbea5f950cd61e069245b9
-
SHA256
d4321ae1e165f5adca29ae3458bb03c69dffe96a8712c8cd297d1ef58a5beaf1
-
SHA512
d7fe7e12e0e7ad38a288f30bb8b6b60caec8be4c8c42d8ba0328d05496b40859100e79414087bbab11c02a1847daa8f8f82c97608465fbd7e24bcb943a5d6acb
-
SSDEEP
49152:J70vVrYK8m0TzBNMFcUVcAYXnGYXPNd2kala+yihdXAF/edvoRFRh1Z+WD14gkz8:JwdrytXlposN/I83HpR7h5u
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-14_9e5e962c28d2b4bb05a5c27697415866_icedid_ramnit_ruftar_strictor.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-14_9e5e962c28d2b4bb05a5c27697415866_icedid_ramnit_ruftar_strictor
-
Size
7.7MB
-
MD5
9e5e962c28d2b4bb05a5c27697415866
-
SHA1
3719d116923c7b9433cbea5f950cd61e069245b9
-
SHA256
d4321ae1e165f5adca29ae3458bb03c69dffe96a8712c8cd297d1ef58a5beaf1
-
SHA512
d7fe7e12e0e7ad38a288f30bb8b6b60caec8be4c8c42d8ba0328d05496b40859100e79414087bbab11c02a1847daa8f8f82c97608465fbd7e24bcb943a5d6acb
-
SSDEEP
49152:J70vVrYK8m0TzBNMFcUVcAYXnGYXPNd2kala+yihdXAF/edvoRFRh1Z+WD14gkz8:JwdrytXlposN/I83HpR7h5u
-
Ramnit family
-
Drops file in Drivers directory
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-