General

  • Target

    2025-01-26_2d434e28566302afc3ab568fae8c4aeb_hijackloader_icedid

  • Size

    4.0MB

  • Sample

    250126-jfcr2awlc1

  • MD5

    2d434e28566302afc3ab568fae8c4aeb

  • SHA1

    131bea79df8b8605475e61efffdad94398916073

  • SHA256

    dba3dccf8e748cf427435390eb1673b9b3aed336d08d84f075f9edfc9cc3d272

  • SHA512

    2c2c249a0717d8f62d21eb78f4419b2d9719f41d14eaa516fd735f665d28059df491c00168d61b5a2da19f9e81834deeaf0f2b5a31372b2d6740073c6e745619

  • SSDEEP

    49152:+QZAdVyVT9n/Gg0P+WhozCpcGPAnO2nABGt4IdjWx8Uh3ToaG4VbUVfQ25iBxp3M:vGdVyVT9nOgmhRpjmnCqt6oabOV

Malware Config

Targets

    • Target

      2025-01-26_2d434e28566302afc3ab568fae8c4aeb_hijackloader_icedid

    • Size

      4.0MB

    • MD5

      2d434e28566302afc3ab568fae8c4aeb

    • SHA1

      131bea79df8b8605475e61efffdad94398916073

    • SHA256

      dba3dccf8e748cf427435390eb1673b9b3aed336d08d84f075f9edfc9cc3d272

    • SHA512

      2c2c249a0717d8f62d21eb78f4419b2d9719f41d14eaa516fd735f665d28059df491c00168d61b5a2da19f9e81834deeaf0f2b5a31372b2d6740073c6e745619

    • SSDEEP

      49152:+QZAdVyVT9n/Gg0P+WhozCpcGPAnO2nABGt4IdjWx8Uh3ToaG4VbUVfQ25iBxp3M:vGdVyVT9nOgmhRpjmnCqt6oabOV

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks