General
-
Target
2025-02-18_8363a92c1e32802788a6d1259872be30_icedid_luca-stealer
-
Size
13.8MB
-
Sample
250218-274nya1qgp
-
MD5
8363a92c1e32802788a6d1259872be30
-
SHA1
948e9bc18b3bd0250fe59be6b3538bd33636a985
-
SHA256
0afe8addac151b6eb79382834d01e957b10abc7ee90d73bda70390830f6a1110
-
SHA512
779f1d1ad0449496d3f7f5a0fe35fc84d9f57fc29c08a060ea6cb414c49d444e2256a29f03b8f3f8aea572c464f40b0068409ef910157539ecebc5fc175faf19
-
SSDEEP
393216:2vRtlptVYmfr7yBG/41w0vJROFTfCTKw27i:21pttD7yBG/OTvJRGCN27i
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-18_8363a92c1e32802788a6d1259872be30_icedid_luca-stealer.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
2025-02-18_8363a92c1e32802788a6d1259872be30_icedid_luca-stealer
-
Size
13.8MB
-
MD5
8363a92c1e32802788a6d1259872be30
-
SHA1
948e9bc18b3bd0250fe59be6b3538bd33636a985
-
SHA256
0afe8addac151b6eb79382834d01e957b10abc7ee90d73bda70390830f6a1110
-
SHA512
779f1d1ad0449496d3f7f5a0fe35fc84d9f57fc29c08a060ea6cb414c49d444e2256a29f03b8f3f8aea572c464f40b0068409ef910157539ecebc5fc175faf19
-
SSDEEP
393216:2vRtlptVYmfr7yBG/41w0vJROFTfCTKw27i:21pttD7yBG/OTvJRGCN27i
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1