General

  • Target

    2024-04-20_34b2e448de55fb47dc7713bb4e3979cb_floxif_icedid

  • Size

    4.0MB

  • MD5

    34b2e448de55fb47dc7713bb4e3979cb

  • SHA1

    1d5b2ad8399b02ffaebd9f3e85618f4580a2280f

  • SHA256

    571cf2dd1216a9f8c50284601fea6b30ee1bbad80b1f1eb557e70acc0172da2f

  • SHA512

    c2028e776c71387436795ad0d38d3294f003439706cb9f8baf4d2f46616e195f05c587a5f23de498b688f1c38535202dc55f8be83d89033f29d487cd748540f5

  • SSDEEP

    49152:TVIrNVTG7LCEJ4MB8N7zq/7Zd1G+twFd9hTGD+itP34s17n8T/9v:TVIELQHN7zqTT1G+tm4xtPoab8Tx

Score
10/10

Malware Config

Signatures

  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_34b2e448de55fb47dc7713bb4e3979cb_floxif_icedid
    .exe windows:4 windows x86 arch:x86

    6aba83944d5cca5164007d0b8b587d45


    Headers

    Imports

    Sections