General
-
Target
2024-11-10_463a77c318642e3ef3d173b2dde561f6_floxif_icedid
-
Size
346KB
-
Sample
241110-w39fqsvrar
-
MD5
463a77c318642e3ef3d173b2dde561f6
-
SHA1
51a0c410656c330514e06ed3c06fe5b252910d73
-
SHA256
ad97bc1b4d266fce760e577b83ecb538d943f68ddbf705d88c8333861b7a483e
-
SHA512
31064dd222b716b9a71dba517549dad362d44b2a124d0c63281be9ce3f51f513664904e89cf7531d8aa36cb8def7dbdf43316360fc1cc7997d852374a885a90b
-
SSDEEP
6144:05svNx4j3rXTJbH0ROLn9p/F1A3a3R3nObBV+UdvrEFp7hKoX:0WvN6fDJbHIOBpKa3lCBjvrEH7pX
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-10_463a77c318642e3ef3d173b2dde561f6_floxif_icedid.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-11-10_463a77c318642e3ef3d173b2dde561f6_floxif_icedid
-
Size
346KB
-
MD5
463a77c318642e3ef3d173b2dde561f6
-
SHA1
51a0c410656c330514e06ed3c06fe5b252910d73
-
SHA256
ad97bc1b4d266fce760e577b83ecb538d943f68ddbf705d88c8333861b7a483e
-
SHA512
31064dd222b716b9a71dba517549dad362d44b2a124d0c63281be9ce3f51f513664904e89cf7531d8aa36cb8def7dbdf43316360fc1cc7997d852374a885a90b
-
SSDEEP
6144:05svNx4j3rXTJbH0ROLn9p/F1A3a3R3nObBV+UdvrEFp7hKoX:0WvN6fDJbHIOBpKa3lCBjvrEH7pX
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-