General
-
Target
2024-09-02_38c9a579970e3fbc006fc34dba03fc47_floxif_icedid
-
Size
2.5MB
-
Sample
240902-a4pbaswglq
-
MD5
38c9a579970e3fbc006fc34dba03fc47
-
SHA1
10a05768bfe6661df1d8fb0df403ca03965d2bfa
-
SHA256
0943be884e555a0d7ad756dd8ac102354f58df419917b3158e49be196a5bba65
-
SHA512
aa93b50f2f2285d2afa93afbda884538128a0baf565085dccbfd69e8512accdc4aa4e4e049042d83a84311224b1d4e27710a848a29a3050ff9ba844930dd771d
-
SSDEEP
49152:Ozhc5YE+vxWaj1hwsvyDNmOL06q646P6Y696NffxLwvh2ds8vn4BdJsr7KB2wqKZ:OtTE+QajBvyDNmK06q646P6Y696Nh0J7
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-02_38c9a579970e3fbc006fc34dba03fc47_floxif_icedid.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
2024-09-02_38c9a579970e3fbc006fc34dba03fc47_floxif_icedid
-
Size
2.5MB
-
MD5
38c9a579970e3fbc006fc34dba03fc47
-
SHA1
10a05768bfe6661df1d8fb0df403ca03965d2bfa
-
SHA256
0943be884e555a0d7ad756dd8ac102354f58df419917b3158e49be196a5bba65
-
SHA512
aa93b50f2f2285d2afa93afbda884538128a0baf565085dccbfd69e8512accdc4aa4e4e049042d83a84311224b1d4e27710a848a29a3050ff9ba844930dd771d
-
SSDEEP
49152:Ozhc5YE+vxWaj1hwsvyDNmOL06q646P6Y696NffxLwvh2ds8vn4BdJsr7KB2wqKZ:OtTE+QajBvyDNmK06q646P6Y696Nh0J7
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-