General

  • Target

    2025-02-23_c610be89a9aa97fbb2d4a06230fe479a_hijackloader_icedid_luca-stealer

  • Size

    3.5MB

  • Sample

    250223-eq3c8aykw3

  • MD5

    c610be89a9aa97fbb2d4a06230fe479a

  • SHA1

    c085f518b6e3e0b17f7a827a338fa937af5887a1

  • SHA256

    126d3d63170c7761901cd0ba6bc4f83d1160521436a12cdedb618867c4341794

  • SHA512

    11727bc8b719f127467dab2ad2e498a54a71e5b27354709b2b87e9ed96fb69844784383986c436264b61205dbf5b1e74052cfdb876d5b0cd21f05042f7113ab8

  • SSDEEP

    49152:oCwsbCANnKXferL7Vwe/Gg0P+Whw2n0vRrTYzSkI+s9f:jws2ANnKXOaeOgmh1+RrkzSv3

Malware Config

Targets

    • Target

      2025-02-23_c610be89a9aa97fbb2d4a06230fe479a_hijackloader_icedid_luca-stealer

    • Size

      3.5MB

    • MD5

      c610be89a9aa97fbb2d4a06230fe479a

    • SHA1

      c085f518b6e3e0b17f7a827a338fa937af5887a1

    • SHA256

      126d3d63170c7761901cd0ba6bc4f83d1160521436a12cdedb618867c4341794

    • SHA512

      11727bc8b719f127467dab2ad2e498a54a71e5b27354709b2b87e9ed96fb69844784383986c436264b61205dbf5b1e74052cfdb876d5b0cd21f05042f7113ab8

    • SSDEEP

      49152:oCwsbCANnKXferL7Vwe/Gg0P+Whw2n0vRrTYzSkI+s9f:jws2ANnKXOaeOgmh1+RrkzSv3

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks