General

  • Target

    2024-06-12_a593b9d1080300585a47eec7bbf94792_floxif_icedid

  • Size

    3.8MB

  • MD5

    a593b9d1080300585a47eec7bbf94792

  • SHA1

    fc72a3abd08cf1417fce071531d5153d7bfc3a2b

  • SHA256

    a545ecc91828e82b1699ac1a9d813617330b38e79ec7aa3df05060fcfe9ec5e5

  • SHA512

    1bc62a3680a092ca040afb9909959449610f43fee5797f7009dc241444e4c1fec36d5ab30a2a61eb558d272bc20d2317c563b9ffbfa5a4c9da809ba1aa3304b2

  • SSDEEP

    49152:o7xxnJR4XxoT9sJPBeqMoFd/nEpw1ywgPKjQ2Pk1IiG17n8TPfV:o7rjMyT9ueq/PX1yw+l2Pkfkb8TXV

Score
10/10

Malware Config

Signatures

  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs

Files

  • 2024-06-12_a593b9d1080300585a47eec7bbf94792_floxif_icedid
    .exe windows:4 windows x86 arch:x86

    0241d06196d8fa27780716b8ceddad9e


    Code Sign

    Headers

    Imports

    Sections