General

  • Target

    2024-04-25_24c591db8fbdcaab94619d559d2fdd1d_floxif_icedid

  • Size

    3.8MB

  • MD5

    24c591db8fbdcaab94619d559d2fdd1d

  • SHA1

    4d38d2e9f8873b328e11ce02d6361f240a76cc6f

  • SHA256

    c0275ef884f252d337755c4ade37f06698271e40f3efab76f336631cb58b2b05

  • SHA512

    f0428a67043f30fa0a10a5daf8bd0d6f544fd7b357c6029b50b839e79e973031a1d3794300d26d6a707c8899accb206efc4c8d7b247dbb0d1273db71b2f5957d

  • SSDEEP

    49152:o7xxwJR4Xxo69sJPBeqMoFd/nEpw1ywgjKjQ2Pk1IiG17n8TPj:o70jMy69ueq/PX1yw2l2Pkfkb8TL

Score
10/10

Malware Config

Signatures

  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs

Files

  • 2024-04-25_24c591db8fbdcaab94619d559d2fdd1d_floxif_icedid
    .exe windows:4 windows x86 arch:x86

    0241d06196d8fa27780716b8ceddad9e


    Code Sign

    Headers

    Imports

    Sections