General
-
Target
2025-02-03_c075aecfb18905d9781c77ea4fea1851_hijackloader_icedid_luca-stealer
-
Size
4.9MB
-
Sample
250203-ar46zstkdz
-
MD5
c075aecfb18905d9781c77ea4fea1851
-
SHA1
3d719e8d9433c4ca375d02b0bbba8413a33c83cf
-
SHA256
0565cbe4947382af14b02b590f3a271a81a5ed967b6c9c2850a01b427c5d1e72
-
SHA512
3b03bacf211392cf088fd9101d7284abacf130d7e543e94cbdf560a8349387f113830213cacb0e558e0a6da37390d995758b7c84febb9154502863b9f5e0982e
-
SSDEEP
49152:PQZAdVyVT9n/Gg0P+WhoCYbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8bU:oGdVyVT9nOgmhNYbXsPN5kiQaZ56
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-03_c075aecfb18905d9781c77ea4fea1851_hijackloader_icedid_luca-stealer.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-02-03_c075aecfb18905d9781c77ea4fea1851_hijackloader_icedid_luca-stealer
-
Size
4.9MB
-
MD5
c075aecfb18905d9781c77ea4fea1851
-
SHA1
3d719e8d9433c4ca375d02b0bbba8413a33c83cf
-
SHA256
0565cbe4947382af14b02b590f3a271a81a5ed967b6c9c2850a01b427c5d1e72
-
SHA512
3b03bacf211392cf088fd9101d7284abacf130d7e543e94cbdf560a8349387f113830213cacb0e558e0a6da37390d995758b7c84febb9154502863b9f5e0982e
-
SSDEEP
49152:PQZAdVyVT9n/Gg0P+WhoCYbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8bU:oGdVyVT9nOgmhNYbXsPN5kiQaZ56
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1