General
-
Target
2024-08-01_790315cc71987a18f521db9c9eed4ecd_floxif_icedid
-
Size
2.2MB
-
Sample
240801-3hzjcssdqm
-
MD5
790315cc71987a18f521db9c9eed4ecd
-
SHA1
aae84252740741f0b1dea296083be581e22b4921
-
SHA256
80110d805495fed3390a9a7c69bd24fe04e1cb246bda1596aaf738bfceea05a3
-
SHA512
c4cfa257a3fbd405f814689c924a579036e45f06f0d147844b18bd195d90be9f572cd5f65417e5010e736dd833a058f6bce2c8682bec88789b63bf4149b4a780
-
SSDEEP
49152:fpsP8VSf7gCGzy1nW9Tg3RK1TvE7y1vkw:f2Ux8nWBCo1Td9
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-01_790315cc71987a18f521db9c9eed4ecd_floxif_icedid.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
2024-08-01_790315cc71987a18f521db9c9eed4ecd_floxif_icedid
-
Size
2.2MB
-
MD5
790315cc71987a18f521db9c9eed4ecd
-
SHA1
aae84252740741f0b1dea296083be581e22b4921
-
SHA256
80110d805495fed3390a9a7c69bd24fe04e1cb246bda1596aaf738bfceea05a3
-
SHA512
c4cfa257a3fbd405f814689c924a579036e45f06f0d147844b18bd195d90be9f572cd5f65417e5010e736dd833a058f6bce2c8682bec88789b63bf4149b4a780
-
SSDEEP
49152:fpsP8VSf7gCGzy1nW9Tg3RK1TvE7y1vkw:f2Ux8nWBCo1Td9
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-