General
-
Target
2025-04-03_220aae5d05fd2cc172ddb78e3b5a79d8_hijackloader_icedid
-
Size
3.8MB
-
Sample
250403-rv76gsxxf1
-
MD5
220aae5d05fd2cc172ddb78e3b5a79d8
-
SHA1
7f66e1d9d3bb81eb4df045ca7ece093ca166a595
-
SHA256
2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245
-
SHA512
3252348ade86c5913648c041ce58e438b7be7ca8b1554ba64f1024a4d9e126d19bb8a58536f5a4a1d0b2c93d472393f32336fac800c1b8b66a82bd274e0fc2c2
-
SSDEEP
49152:MhbFk85ulG4dJXY5UeD1jWs1O/BP4YPpPAPGPpPVP6PJP8P8P9PdPdPRPfPdPlPl:WRk85ulG4XywJxFTsmBm
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-03_220aae5d05fd2cc172ddb78e3b5a79d8_hijackloader_icedid.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
valleyrat_s2
1.0
154.219.97.191:6666
-
campaign_date
2025. 3.14
Targets
-
-
Target
2025-04-03_220aae5d05fd2cc172ddb78e3b5a79d8_hijackloader_icedid
-
Size
3.8MB
-
MD5
220aae5d05fd2cc172ddb78e3b5a79d8
-
SHA1
7f66e1d9d3bb81eb4df045ca7ece093ca166a595
-
SHA256
2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245
-
SHA512
3252348ade86c5913648c041ce58e438b7be7ca8b1554ba64f1024a4d9e126d19bb8a58536f5a4a1d0b2c93d472393f32336fac800c1b8b66a82bd274e0fc2c2
-
SSDEEP
49152:MhbFk85ulG4dJXY5UeD1jWs1O/BP4YPpPAPGPpPVP6PJP8P8P9PdPdPRPfPdPlPl:WRk85ulG4XywJxFTsmBm
-
UAC bypass
-
Valleyrat_s2 family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
4