General
-
Target
2025-03-01_46fff08b53fa1116eb7e1a285a06bf02_hijackloader_icedid_luca-stealer
-
Size
7.4MB
-
Sample
250301-a4zr2atxds
-
MD5
46fff08b53fa1116eb7e1a285a06bf02
-
SHA1
7e75921eb7adfd2d5b64014c6529fa7196dda52e
-
SHA256
43f64ad2f5aaa3abb7a7d3b1fc666728d2837cf95add8619145f861e06dd9ba0
-
SHA512
0d182c4cff09d027c18f6a563957f0d3c1c8f80e29c6c4e86ffdf31b01a0680faf7eb3a0ac749652881db17fff3bd3e868382fb3671addce8a6bf8baf99b80db
-
SSDEEP
98304:uws2ANnKXOaeOgmhjs/c0ndiziY8h0mg2fZFccODoilA4jvtqdhOykyKTxis/c02:8KXbeO7Sc0ns8OSiVjvtqGc06/
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-01_46fff08b53fa1116eb7e1a285a06bf02_hijackloader_icedid_luca-stealer.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-03-01_46fff08b53fa1116eb7e1a285a06bf02_hijackloader_icedid_luca-stealer
-
Size
7.4MB
-
MD5
46fff08b53fa1116eb7e1a285a06bf02
-
SHA1
7e75921eb7adfd2d5b64014c6529fa7196dda52e
-
SHA256
43f64ad2f5aaa3abb7a7d3b1fc666728d2837cf95add8619145f861e06dd9ba0
-
SHA512
0d182c4cff09d027c18f6a563957f0d3c1c8f80e29c6c4e86ffdf31b01a0680faf7eb3a0ac749652881db17fff3bd3e868382fb3671addce8a6bf8baf99b80db
-
SSDEEP
98304:uws2ANnKXOaeOgmhjs/c0ndiziY8h0mg2fZFccODoilA4jvtqdhOykyKTxis/c02:8KXbeO7Sc0ns8OSiVjvtqGc06/
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1