General
-
Target
2024-11-21_04870ef8d61fb27e1df5512bf7070799_floxif_icedid_silence
-
Size
1.6MB
-
Sample
241121-pkfx5ssfrp
-
MD5
04870ef8d61fb27e1df5512bf7070799
-
SHA1
ae187ffb1b45d8285b6c35ff7332afd6a4f05247
-
SHA256
5e5f2309f10076154b45802f3393e57db4c9f7b6495a0123a5c0264a73ced06a
-
SHA512
65eb5ecc4cec07b1c91b2f3e733b3f5002021df29d279f1b416a44812da5874e95bb3c2f099f9c643b85fa62818c8ff1374e6186cd7ca675035ba7faf163cc56
-
SSDEEP
49152:MunAc+DJxMSI8V+qH4MQjffRKku8r4qk5a7sCWeyNwZ:MoAc+DJxtI8VxHyffkku8rD/7sCWeyN8
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_04870ef8d61fb27e1df5512bf7070799_floxif_icedid_silence.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-21_04870ef8d61fb27e1df5512bf7070799_floxif_icedid_silence.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-11-21_04870ef8d61fb27e1df5512bf7070799_floxif_icedid_silence
-
Size
1.6MB
-
MD5
04870ef8d61fb27e1df5512bf7070799
-
SHA1
ae187ffb1b45d8285b6c35ff7332afd6a4f05247
-
SHA256
5e5f2309f10076154b45802f3393e57db4c9f7b6495a0123a5c0264a73ced06a
-
SHA512
65eb5ecc4cec07b1c91b2f3e733b3f5002021df29d279f1b416a44812da5874e95bb3c2f099f9c643b85fa62818c8ff1374e6186cd7ca675035ba7faf163cc56
-
SSDEEP
49152:MunAc+DJxMSI8V+qH4MQjffRKku8r4qk5a7sCWeyNwZ:MoAc+DJxtI8VxHyffkku8rD/7sCWeyN8
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-