General
-
Target
2025-01-14_d2f8802580c4aeec563e44c42a15f7f0_icedid_ramnit_ruftar_strictor
-
Size
7.7MB
-
Sample
250114-vlflnawkbl
-
MD5
d2f8802580c4aeec563e44c42a15f7f0
-
SHA1
c73ad943787072f1014a9c6ac6b57dea622508c9
-
SHA256
e68b5ca4aa7e35e08411dc1c05cf33b0e50c9287ebbffdc07750532fca9e33c5
-
SHA512
e77d017a7d60b4760bdd03c7ebb86e1f4a9ea1e6a218f73558ed5d4a3771da69004657a965504bc0909373c587189fd9297886884ea92b313cf374c6ca64acc4
-
SSDEEP
49152:r70vVrYK8m0TzBNMFcUVcAYXnGYXPNd2kala+yihdXAF/edvoRFRh1Z+WD14gkz8:rwdrytXlposN/I83HpR7h5u
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-14_d2f8802580c4aeec563e44c42a15f7f0_icedid_ramnit_ruftar_strictor.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2025-01-14_d2f8802580c4aeec563e44c42a15f7f0_icedid_ramnit_ruftar_strictor
-
Size
7.7MB
-
MD5
d2f8802580c4aeec563e44c42a15f7f0
-
SHA1
c73ad943787072f1014a9c6ac6b57dea622508c9
-
SHA256
e68b5ca4aa7e35e08411dc1c05cf33b0e50c9287ebbffdc07750532fca9e33c5
-
SHA512
e77d017a7d60b4760bdd03c7ebb86e1f4a9ea1e6a218f73558ed5d4a3771da69004657a965504bc0909373c587189fd9297886884ea92b313cf374c6ca64acc4
-
SSDEEP
49152:r70vVrYK8m0TzBNMFcUVcAYXnGYXPNd2kala+yihdXAF/edvoRFRh1Z+WD14gkz8:rwdrytXlposN/I83HpR7h5u
-
Ramnit family
-
Drops file in Drivers directory
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-