General
-
Target
2025-03-01_dc799a16be3c52c9d5a058d6e5c57899_hijackloader_icedid_luca-stealer
-
Size
4.7MB
-
Sample
250301-wm6d5sxwew
-
MD5
dc799a16be3c52c9d5a058d6e5c57899
-
SHA1
b29541b2d784c8e4498d6454c02c15a76a19f877
-
SHA256
3b06c0ad14216b3ff75a8c74f37cc0a4f929686b63e208bfed701bfbb0b1ce94
-
SHA512
1e2674b77a6d5d449397d0d729a8c4c96e471377261f95247dfb7c4484805f053b12cdf9a6a85a1915d77dcd9ad8e3086f6b1fecb552cb497138b75420ee1816
-
SSDEEP
49152:e09XJt4HIN2H2tFvduyStgQbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8w:PZJt4HINy2LkWQbXsPN5kiQaZ56
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-01_dc799a16be3c52c9d5a058d6e5c57899_hijackloader_icedid_luca-stealer.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-03-01_dc799a16be3c52c9d5a058d6e5c57899_hijackloader_icedid_luca-stealer
-
Size
4.7MB
-
MD5
dc799a16be3c52c9d5a058d6e5c57899
-
SHA1
b29541b2d784c8e4498d6454c02c15a76a19f877
-
SHA256
3b06c0ad14216b3ff75a8c74f37cc0a4f929686b63e208bfed701bfbb0b1ce94
-
SHA512
1e2674b77a6d5d449397d0d729a8c4c96e471377261f95247dfb7c4484805f053b12cdf9a6a85a1915d77dcd9ad8e3086f6b1fecb552cb497138b75420ee1816
-
SSDEEP
49152:e09XJt4HIN2H2tFvduyStgQbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8w:PZJt4HINy2LkWQbXsPN5kiQaZ56
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1