General
-
Target
2024-10-11_999c54d1f28488473d606dff922de019_floxif_icedid
-
Size
2.6MB
-
Sample
241011-3c151avajn
-
MD5
999c54d1f28488473d606dff922de019
-
SHA1
59cedc971282ca87b2c6a05074c61f63c037db17
-
SHA256
d595ff1a40c6a0cbde4a68a8bc0df85d0392acc1784060f641b2f28656bbfd14
-
SHA512
193c93e9a0da1a6fdbd62d9b59043c993680326ddeed988dce8899781c97728369b95651290a3ff3da739a07d2e5231b2cdc25efacea3efd19b0d880771972fd
-
SSDEEP
24576:RpqzhKwykVFLvty85U+PzY0Ff5lAVElV7mTYSllGaqlz0d6PSdTjo8ufJa/zfzkR:RpAhDFy+zWOglvqlz0gQTWfJa/jzkjk2
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-11_999c54d1f28488473d606dff922de019_floxif_icedid.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-11_999c54d1f28488473d606dff922de019_floxif_icedid.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-10-11_999c54d1f28488473d606dff922de019_floxif_icedid
-
Size
2.6MB
-
MD5
999c54d1f28488473d606dff922de019
-
SHA1
59cedc971282ca87b2c6a05074c61f63c037db17
-
SHA256
d595ff1a40c6a0cbde4a68a8bc0df85d0392acc1784060f641b2f28656bbfd14
-
SHA512
193c93e9a0da1a6fdbd62d9b59043c993680326ddeed988dce8899781c97728369b95651290a3ff3da739a07d2e5231b2cdc25efacea3efd19b0d880771972fd
-
SSDEEP
24576:RpqzhKwykVFLvty85U+PzY0Ff5lAVElV7mTYSllGaqlz0d6PSdTjo8ufJa/zfzkR:RpAhDFy+zWOglvqlz0gQTWfJa/jzkjk2
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-