General

  • Target

    2024-02-20_daa35814ec97e86329ecb98327d5d0ac_floxif_icedid

  • Size

    3.9MB

  • MD5

    daa35814ec97e86329ecb98327d5d0ac

  • SHA1

    25f440dbee2a179597e5eba60068ef8a4c5decdb

  • SHA256

    399d61dc94fcd82e8f725d564b010adcf6fd8fd78051ee6ba13f0a172c7a5236

  • SHA512

    cd15702dbc7311244a007d19ef686ee01adbab7792027fb2c9a4633849b1da8ae452e80530093ecdc931b14959c5c30686d55db64a3025b9f78f0a514dbf3035

  • SSDEEP

    49152:aUYK/N9QNg5qej04wA+xyuyYPCMMejTTm22WIs15dTYFgi4PMO5wC17n8Tw9F:aa9QNPeY4IMuyYP4eR15dTnPAIb8TC

Score
10/10

Malware Config

Signatures

  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs

Files

  • 2024-02-20_daa35814ec97e86329ecb98327d5d0ac_floxif_icedid
    .exe windows:4 windows x86 arch:x86

    87e9bcd1ada86298e2ed9176908aadfb


    Code Sign

    Headers

    Imports

    Sections