General

  • Target

    2024-06-04_313818d8cbb1dfe416d7cdbbd79bc5f9_floxif_icedid

  • Size

    3.9MB

  • MD5

    313818d8cbb1dfe416d7cdbbd79bc5f9

  • SHA1

    cd55f32f5c796ead0625d10d53fb4bf125921cdc

  • SHA256

    eac9d8063484f37e9c4bedc7317517c2dc79e5036f8a149f2a5b394856cc3670

  • SHA512

    c2569cad0d9c9c152bd50f5df245241ec3dc5dc45e3ddd106cc7f2177cb7390a02c64afbe5a0fbc32e65f37688af9ad119971fb2d8c9a30deec9877e0dcbfdf4

  • SSDEEP

    49152:BoQg92gO0Eqx5iEeBVxTEdL87+/1N37V4FkqHVPg/4n17n8Tq0:BoOHqiEOVxoJaS1N37tqHVPQSb8TT

Score
10/10

Malware Config

Signatures

  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs

Files

  • 2024-06-04_313818d8cbb1dfe416d7cdbbd79bc5f9_floxif_icedid
    .exe windows:4 windows x86 arch:x86

    1f31eadbab01822475502904221c827f


    Code Sign

    Headers

    Imports

    Sections