General
-
Target
2024-11-21_ebd2dbfdf71c2311de8dcd07b129ac47_floxif_hijackloader_icedid
-
Size
2.1MB
-
Sample
241121-a2y3qaxfmp
-
MD5
ebd2dbfdf71c2311de8dcd07b129ac47
-
SHA1
39fba953366d541f3b40e9834d0afb49e6b7dd0f
-
SHA256
f2a90193974c922c085c2fb9cce842f51be52a718031c263664ed78212909161
-
SHA512
60173983bb7a2f562b7fdb98f029d6fe8b989254b9c1ee1c8225926f87a95caedcdea6a075fe2d137546e7b4c0d40753c89b74161f90a012d61794206c264067
-
SSDEEP
49152:V8PsZNCHFOAxh5f1fHtfxaPZXbuo3j5Xpm:uPsZuFOANfxaPhbuo3j5Xpm
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_ebd2dbfdf71c2311de8dcd07b129ac47_floxif_hijackloader_icedid.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2024-11-21_ebd2dbfdf71c2311de8dcd07b129ac47_floxif_hijackloader_icedid
-
Size
2.1MB
-
MD5
ebd2dbfdf71c2311de8dcd07b129ac47
-
SHA1
39fba953366d541f3b40e9834d0afb49e6b7dd0f
-
SHA256
f2a90193974c922c085c2fb9cce842f51be52a718031c263664ed78212909161
-
SHA512
60173983bb7a2f562b7fdb98f029d6fe8b989254b9c1ee1c8225926f87a95caedcdea6a075fe2d137546e7b4c0d40753c89b74161f90a012d61794206c264067
-
SSDEEP
49152:V8PsZNCHFOAxh5f1fHtfxaPZXbuo3j5Xpm:uPsZuFOANfxaPhbuo3j5Xpm
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-