General

  • Target

    2024-02-20_6ea81f68821b21bd52b968cfb747bd81_floxif_icedid

  • Size

    3.9MB

  • MD5

    6ea81f68821b21bd52b968cfb747bd81

  • SHA1

    c576be50d23e610bb40e05e5031ebe9f80344c05

  • SHA256

    e536807d8a546d06f0976c95f5fad2dd49eb349ec04c8eb8740cdf7ba3f01f28

  • SHA512

    ca41175260c3fd80b2359bd4c07fa98a901567ab77d99f7006f58484e553ef792d61695db718bc90732ed4b0179e3e3ffedf72d6261622cde2ae6906282992b2

  • SSDEEP

    49152:aUYK/NzTNg5qej04wk+xyuyYPCMMejTTm22WIs15dTYFgi4PMO5wC17n8Tw9F:aazTNPeY4IMuyYP4eR15dTnPAIb8TC

Score
10/10

Malware Config

Signatures

  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs

Files

  • 2024-02-20_6ea81f68821b21bd52b968cfb747bd81_floxif_icedid
    .exe windows:4 windows x86 arch:x86

    87e9bcd1ada86298e2ed9176908aadfb


    Code Sign

    Headers

    Imports

    Sections