General
-
Target
2025-01-27_72fab291d14e1996a3892a813811509b_hijackloader_icedid
-
Size
3.8MB
-
Sample
250127-x3662ssmdw
-
MD5
72fab291d14e1996a3892a813811509b
-
SHA1
2a09bd44f10a019a7d29f6b989eeab46769722a7
-
SHA256
dcc4e4dbbe1f72a294ef4e83992ae84b5b7b98a84df0e78ab1d4ec576caa807a
-
SHA512
c1d1a1cb92aa4fde909032d4cb97eb058f1b3cf4973331d8bfb73dde4124a1966ca27d1a1c258f104a1a26b41b4ce66ac0fdb60383127b870686673d841336ca
-
SSDEEP
49152:tCwsbCANnKXferL7Vwe/Gg0P+WhmojG3D8gv4AByhgHwgfxqxyZBoTl+e:Qws2ANnKXOaeOgmhmoj2DF4i7qxF
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-27_72fab291d14e1996a3892a813811509b_hijackloader_icedid.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2025-01-27_72fab291d14e1996a3892a813811509b_hijackloader_icedid
-
Size
3.8MB
-
MD5
72fab291d14e1996a3892a813811509b
-
SHA1
2a09bd44f10a019a7d29f6b989eeab46769722a7
-
SHA256
dcc4e4dbbe1f72a294ef4e83992ae84b5b7b98a84df0e78ab1d4ec576caa807a
-
SHA512
c1d1a1cb92aa4fde909032d4cb97eb058f1b3cf4973331d8bfb73dde4124a1966ca27d1a1c258f104a1a26b41b4ce66ac0fdb60383127b870686673d841336ca
-
SSDEEP
49152:tCwsbCANnKXferL7Vwe/Gg0P+WhmojG3D8gv4AByhgHwgfxqxyZBoTl+e:Qws2ANnKXOaeOgmhmoj2DF4i7qxF
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1