General
-
Target
2025-02-26_b87a0665e61b89b190058f0747aff13a_icedid_luca-stealer
-
Size
13.8MB
-
Sample
250226-1f8m5stxb1
-
MD5
b87a0665e61b89b190058f0747aff13a
-
SHA1
6bbaeb06356c4e29776487581480c3e12058b4db
-
SHA256
1ab3220a5d448d58592aca1dc4c8890fddf8a1bad541bf92c5166e4b2ab5e62d
-
SHA512
0285daf2b3ec25fac8c89ca678c1368c84809e07e87e0b1b4a051307fa5cbd1a5e6d412900f24202e5a7bc86959a497547895425d12e7b533b7064bd3b1bdac5
-
SSDEEP
393216:2vRtlptVYmfr7yBG/41w0vJROFTfCTKw274:21pttD7yBG/OTvJRGCN274
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-26_b87a0665e61b89b190058f0747aff13a_icedid_luca-stealer.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
2025-02-26_b87a0665e61b89b190058f0747aff13a_icedid_luca-stealer
-
Size
13.8MB
-
MD5
b87a0665e61b89b190058f0747aff13a
-
SHA1
6bbaeb06356c4e29776487581480c3e12058b4db
-
SHA256
1ab3220a5d448d58592aca1dc4c8890fddf8a1bad541bf92c5166e4b2ab5e62d
-
SHA512
0285daf2b3ec25fac8c89ca678c1368c84809e07e87e0b1b4a051307fa5cbd1a5e6d412900f24202e5a7bc86959a497547895425d12e7b533b7064bd3b1bdac5
-
SSDEEP
393216:2vRtlptVYmfr7yBG/41w0vJROFTfCTKw274:21pttD7yBG/OTvJRGCN274
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1