General

  • Target

    2025-03-01_dc799a16be3c52c9d5a058d6e5c57899_hijackloader_icedid_luca-stealer

  • Size

    4.7MB

  • Sample

    250301-wp2hzaxrs2

  • MD5

    dc799a16be3c52c9d5a058d6e5c57899

  • SHA1

    b29541b2d784c8e4498d6454c02c15a76a19f877

  • SHA256

    3b06c0ad14216b3ff75a8c74f37cc0a4f929686b63e208bfed701bfbb0b1ce94

  • SHA512

    1e2674b77a6d5d449397d0d729a8c4c96e471377261f95247dfb7c4484805f053b12cdf9a6a85a1915d77dcd9ad8e3086f6b1fecb552cb497138b75420ee1816

  • SSDEEP

    49152:e09XJt4HIN2H2tFvduyStgQbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8w:PZJt4HINy2LkWQbXsPN5kiQaZ56

Malware Config

Targets

    • Target

      2025-03-01_dc799a16be3c52c9d5a058d6e5c57899_hijackloader_icedid_luca-stealer

    • Size

      4.7MB

    • MD5

      dc799a16be3c52c9d5a058d6e5c57899

    • SHA1

      b29541b2d784c8e4498d6454c02c15a76a19f877

    • SHA256

      3b06c0ad14216b3ff75a8c74f37cc0a4f929686b63e208bfed701bfbb0b1ce94

    • SHA512

      1e2674b77a6d5d449397d0d729a8c4c96e471377261f95247dfb7c4484805f053b12cdf9a6a85a1915d77dcd9ad8e3086f6b1fecb552cb497138b75420ee1816

    • SSDEEP

      49152:e09XJt4HIN2H2tFvduyStgQbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8w:PZJt4HINy2LkWQbXsPN5kiQaZ56

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks