General
-
Target
2025-04-03_dcbd97d98e96e4ff8a199e57a93e6ccc_hijackloader_icedid
-
Size
214.1MB
-
Sample
250403-w4nwesvjv4
-
MD5
dcbd97d98e96e4ff8a199e57a93e6ccc
-
SHA1
45918f72ebf923a5d992981ce609f0e38928b3d8
-
SHA256
57a5a4a942ef11f0dfa5644d3c9e86474a9006c381a6412f0214bfce5420267c
-
SHA512
234cb9d5d091b9adfa08a47a00767f89dede91a14bd589f383ee44ee119c7bd024589ee316a6bddb2bf9122c9c0762420a6db10b9af9795a86c7823049b7b1ab
-
SSDEEP
49152:MhbFk85ulG4dJXY5UeD1jWs1O/BP4YPpPAPGPpPVP6PJP8P8P9PdPdPRPfPdPlPU:WRk85ulG4XywJxFTsmB
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-03_dcbd97d98e96e4ff8a199e57a93e6ccc_hijackloader_icedid.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
valleyrat_s2
1.0
154.219.97.191:6666
-
campaign_date
2025. 3.14
Targets
-
-
Target
2025-04-03_dcbd97d98e96e4ff8a199e57a93e6ccc_hijackloader_icedid
-
Size
214.1MB
-
MD5
dcbd97d98e96e4ff8a199e57a93e6ccc
-
SHA1
45918f72ebf923a5d992981ce609f0e38928b3d8
-
SHA256
57a5a4a942ef11f0dfa5644d3c9e86474a9006c381a6412f0214bfce5420267c
-
SHA512
234cb9d5d091b9adfa08a47a00767f89dede91a14bd589f383ee44ee119c7bd024589ee316a6bddb2bf9122c9c0762420a6db10b9af9795a86c7823049b7b1ab
-
SSDEEP
49152:MhbFk85ulG4dJXY5UeD1jWs1O/BP4YPpPAPGPpPVP6PJP8P8P9PdPdPRPfPdPlPU:WRk85ulG4XywJxFTsmB
-
UAC bypass
-
Valleyrat_s2 family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
4