General
-
Target
2024-08-15_f5caf584177ef9cc84c5deb147fa4bd8_floxif_icedid
-
Size
22.2MB
-
Sample
240815-qn89jatelb
-
MD5
f5caf584177ef9cc84c5deb147fa4bd8
-
SHA1
211f888c9d1398d5445226a2c5eacccb022b5d43
-
SHA256
61dde3aa5122855d8c2a85e709b9492dac95132d01f8857a1be6729f16fb408b
-
SHA512
353181cedaa21def2a37d7a07c70bd34d0b324013b0c2b494ce4aaf45a655bd6fe0cefa0e8c7450e01ab9420a16d1ac851f571b62d9ac64a2e8ddf96b6b0d802
-
SSDEEP
393216:fXeXsQXKIQ2A6p/jJicojuCXiv3vMBnz4CFxDqg9u4PS6n4CEJXE0wEKD3/Lo:fXeXsQXKx6liUCXk3EmCFpq4PznwXDw4
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-15_f5caf584177ef9cc84c5deb147fa4bd8_floxif_icedid.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
2024-08-15_f5caf584177ef9cc84c5deb147fa4bd8_floxif_icedid
-
Size
22.2MB
-
MD5
f5caf584177ef9cc84c5deb147fa4bd8
-
SHA1
211f888c9d1398d5445226a2c5eacccb022b5d43
-
SHA256
61dde3aa5122855d8c2a85e709b9492dac95132d01f8857a1be6729f16fb408b
-
SHA512
353181cedaa21def2a37d7a07c70bd34d0b324013b0c2b494ce4aaf45a655bd6fe0cefa0e8c7450e01ab9420a16d1ac851f571b62d9ac64a2e8ddf96b6b0d802
-
SSDEEP
393216:fXeXsQXKIQ2A6p/jJicojuCXiv3vMBnz4CFxDqg9u4PS6n4CEJXE0wEKD3/Lo:fXeXsQXKx6liUCXk3EmCFpq4PznwXDw4
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-