General
-
Target
2025-01-25_005dae58cd5f4131429e8af56da801bb_icedid_luca-stealer
-
Size
2.6MB
-
Sample
250125-zv1qeazncy
-
MD5
005dae58cd5f4131429e8af56da801bb
-
SHA1
691f825a3c6aa679d55983e8a0de9c99493658ca
-
SHA256
8000bb59a113e6e758ffc2038a7c8a91f1ee0292e5e78b00b097a52b885286e5
-
SHA512
80222ab38570309f0261fa356aa633ed8c487aeaed7e1801ac37a7e983d93699e4870583f3998606b2d6416c60c231d3b7f339962f773ad291f751ca4b6a3843
-
SSDEEP
49152:2CwsbCANnKXferL7Vwe/Gg0P+WhN1dtal:Bws2ANnKXOaeOgmhDdtO
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-25_005dae58cd5f4131429e8af56da801bb_icedid_luca-stealer.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-25_005dae58cd5f4131429e8af56da801bb_icedid_luca-stealer
-
Size
2.6MB
-
MD5
005dae58cd5f4131429e8af56da801bb
-
SHA1
691f825a3c6aa679d55983e8a0de9c99493658ca
-
SHA256
8000bb59a113e6e758ffc2038a7c8a91f1ee0292e5e78b00b097a52b885286e5
-
SHA512
80222ab38570309f0261fa356aa633ed8c487aeaed7e1801ac37a7e983d93699e4870583f3998606b2d6416c60c231d3b7f339962f773ad291f751ca4b6a3843
-
SSDEEP
49152:2CwsbCANnKXferL7Vwe/Gg0P+WhN1dtal:Bws2ANnKXOaeOgmhDdtO
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1