General
-
Target
2024-05-14_cc94d4e741daf45e3955db6244915f6b_floxif_icedid
-
Size
3.9MB
-
Sample
240514-mtsl7acg89
-
MD5
cc94d4e741daf45e3955db6244915f6b
-
SHA1
60a3d4ac86f7a80cbea21645063d2fa06bb52ebc
-
SHA256
80f6330fb12ab444181cf567965a29435753bbe09f90617766e7449bd80ebce7
-
SHA512
974cde26785700c40445fcabcd678d935a60ebf5c9ee42c60f751128d775d36a4030d693fbcc90647824018f58d0c7584430bb311f863975efe864cc90750e2d
-
SSDEEP
49152:3lrytcnhHSCtyzqhQvW/hAjVYGm5oM1N3KkdEh4KUPPzlJ17n8Tiv:3lrIRC0zyh2YGm5L1N3R84PPP5Pb8Ts
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-14_cc94d4e741daf45e3955db6244915f6b_floxif_icedid.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
2024-05-14_cc94d4e741daf45e3955db6244915f6b_floxif_icedid
-
Size
3.9MB
-
MD5
cc94d4e741daf45e3955db6244915f6b
-
SHA1
60a3d4ac86f7a80cbea21645063d2fa06bb52ebc
-
SHA256
80f6330fb12ab444181cf567965a29435753bbe09f90617766e7449bd80ebce7
-
SHA512
974cde26785700c40445fcabcd678d935a60ebf5c9ee42c60f751128d775d36a4030d693fbcc90647824018f58d0c7584430bb311f863975efe864cc90750e2d
-
SSDEEP
49152:3lrytcnhHSCtyzqhQvW/hAjVYGm5oM1N3KkdEh4KUPPzlJ17n8Tiv:3lrIRC0zyh2YGm5L1N3R84PPP5Pb8Ts
Score9/10-
UPX dump on OEP (original entry point)
-
Modifies AppInit DLL entries
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1