General
-
Target
2024-05-10_50e724b33b5cca9aafbe70d6a2e3f7a5_cobalt-strike_floxif_icedid
-
Size
758KB
-
Sample
240510-bcp9yshd6y
-
MD5
50e724b33b5cca9aafbe70d6a2e3f7a5
-
SHA1
2a942816688a6f34d78a8584f2baee394dce4168
-
SHA256
e6ca1e25736a89fc6be6215dd75f3e936a5d76f5616dcde79e3a2f5183c1e4fd
-
SHA512
cb40366384b18d0e662aca45a0bbc2b345fc8f4010ed0a7b5ca527142c561dafd75bc52a5320c5d1b83d54974bc279ec9d145dee4c029a08e019e73d20590dbb
-
SSDEEP
12288:NGlo/L9QuHJrwxXZsuqU1MapTQL00R1dvitdG09apHCqBjvrEH7VZ:OSQ+UXZxqU1/psY0HxitY1pBrEH7VZ
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-10_50e724b33b5cca9aafbe70d6a2e3f7a5_cobalt-strike_floxif_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-10_50e724b33b5cca9aafbe70d6a2e3f7a5_cobalt-strike_floxif_icedid.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-10_50e724b33b5cca9aafbe70d6a2e3f7a5_cobalt-strike_floxif_icedid
-
Size
758KB
-
MD5
50e724b33b5cca9aafbe70d6a2e3f7a5
-
SHA1
2a942816688a6f34d78a8584f2baee394dce4168
-
SHA256
e6ca1e25736a89fc6be6215dd75f3e936a5d76f5616dcde79e3a2f5183c1e4fd
-
SHA512
cb40366384b18d0e662aca45a0bbc2b345fc8f4010ed0a7b5ca527142c561dafd75bc52a5320c5d1b83d54974bc279ec9d145dee4c029a08e019e73d20590dbb
-
SSDEEP
12288:NGlo/L9QuHJrwxXZsuqU1MapTQL00R1dvitdG09apHCqBjvrEH7VZ:OSQ+UXZxqU1/psY0HxitY1pBrEH7VZ
Score9/10-
UPX dump on OEP (original entry point)
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-