General

  • Target

    2025-01-28_5cd0d4b25a816e637fdaa032f1c9d1b8_hijackloader_icedid_luca-stealer

  • Size

    4.6MB

  • Sample

    250128-apllvszrgy

  • MD5

    5cd0d4b25a816e637fdaa032f1c9d1b8

  • SHA1

    a8b2ed880498590ad911e4dbf55494ab71849d30

  • SHA256

    a82031094dad595bbb895b19201b4cdbd2cd8bcc702f3d6ad322aeb0c739c3c7

  • SHA512

    d81ca2c46364247d875cb413018ccb1b8893b88c2fb912f631106b58b1f6a9308c045fb8c57c098274f73b6774a9d4c45ed829a39f1102f66bccea66846ac3ee

  • SSDEEP

    49152:qYREXSVMKi36sSxbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8b8ITDnl2X:f2SVMK86sSxbXsPN5kiQaZ56

Malware Config

Targets

    • Target

      2025-01-28_5cd0d4b25a816e637fdaa032f1c9d1b8_hijackloader_icedid_luca-stealer

    • Size

      4.6MB

    • MD5

      5cd0d4b25a816e637fdaa032f1c9d1b8

    • SHA1

      a8b2ed880498590ad911e4dbf55494ab71849d30

    • SHA256

      a82031094dad595bbb895b19201b4cdbd2cd8bcc702f3d6ad322aeb0c739c3c7

    • SHA512

      d81ca2c46364247d875cb413018ccb1b8893b88c2fb912f631106b58b1f6a9308c045fb8c57c098274f73b6774a9d4c45ed829a39f1102f66bccea66846ac3ee

    • SSDEEP

      49152:qYREXSVMKi36sSxbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8b8ITDnl2X:f2SVMK86sSxbXsPN5kiQaZ56

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks