General
-
Target
2024-03-23_77442919f69e72c87131ec3990409a34_floxif_icedid
-
Size
4.0MB
-
Sample
240323-eb63vsff4t
-
MD5
77442919f69e72c87131ec3990409a34
-
SHA1
cee797e48e6125643ca33fcedfcfafded90dc0d5
-
SHA256
5492f7d2bdd766a9ece1ed3b5422036188d7be8bcde72eb87a1dbbf323a1d861
-
SHA512
c18b0407e483e85af610a4621d44e3c0b2f7583a91ca0446e3c362d1e958a6b3921099d4a88181c06b64fa9f09ae1a3764115befc7706a928f9eee691d35d026
-
SSDEEP
49152:1B5nXN/5iGsRLt4ee8GAQpTBwYceNSJP5w1mRAYWc4D5bp1ZPTQyL9T1/c8apR:1BpN+LIAUFwXN+1mR3WxtPJXk8a3
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-23_77442919f69e72c87131ec3990409a34_floxif_icedid.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
2024-03-23_77442919f69e72c87131ec3990409a34_floxif_icedid
-
Size
4.0MB
-
MD5
77442919f69e72c87131ec3990409a34
-
SHA1
cee797e48e6125643ca33fcedfcfafded90dc0d5
-
SHA256
5492f7d2bdd766a9ece1ed3b5422036188d7be8bcde72eb87a1dbbf323a1d861
-
SHA512
c18b0407e483e85af610a4621d44e3c0b2f7583a91ca0446e3c362d1e958a6b3921099d4a88181c06b64fa9f09ae1a3764115befc7706a928f9eee691d35d026
-
SSDEEP
49152:1B5nXN/5iGsRLt4ee8GAQpTBwYceNSJP5w1mRAYWc4D5bp1ZPTQyL9T1/c8apR:1BpN+LIAUFwXN+1mR3WxtPJXk8a3
Score9/10-
UPX dump on OEP (original entry point)
-
Modifies AppInit DLL entries
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1