General
-
Target
2024-11-25_92f1e891467484e53d99e21c9a2adf50_floxif_hijackloader_icedid
-
Size
10.2MB
-
Sample
241125-cx838stlbs
-
MD5
92f1e891467484e53d99e21c9a2adf50
-
SHA1
19ae40a5a327194f0ad2d1210b2b6f2786950665
-
SHA256
d80a7691b76143614d8bb1593e6b1953c77c9e16055f3af35fb085500c5cce85
-
SHA512
b8c4500cd3b62e8c8c6bbc7b360c4e00b98679277489fb4cf225cd0d4c8253cd4a1a22d4013082accd277d9c4bd6fb9e8be9fc8be616d937839a193ec9f5dd97
-
SSDEEP
196608:MmYPY7x1kQTKCgfaF+Sz0UjMGmzK7x1kQTKCgfaF+Sz0UjMGn:5x1vOCI+V0+M4x1vOCI+V0+ME
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-25_92f1e891467484e53d99e21c9a2adf50_floxif_hijackloader_icedid.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://wickedneatr.sbs
https://invinjurhey.sbs
https://laddyirekyi.sbs
https://exilepolsiy.sbs
https://bemuzzeki.sbs
https://exemplarou.sbs
https://isoplethui.sbs
https://frizzettei.sbs
Targets
-
-
Target
2024-11-25_92f1e891467484e53d99e21c9a2adf50_floxif_hijackloader_icedid
-
Size
10.2MB
-
MD5
92f1e891467484e53d99e21c9a2adf50
-
SHA1
19ae40a5a327194f0ad2d1210b2b6f2786950665
-
SHA256
d80a7691b76143614d8bb1593e6b1953c77c9e16055f3af35fb085500c5cce85
-
SHA512
b8c4500cd3b62e8c8c6bbc7b360c4e00b98679277489fb4cf225cd0d4c8253cd4a1a22d4013082accd277d9c4bd6fb9e8be9fc8be616d937839a193ec9f5dd97
-
SSDEEP
196608:MmYPY7x1kQTKCgfaF+Sz0UjMGmzK7x1kQTKCgfaF+Sz0UjMGn:5x1vOCI+V0+M4x1vOCI+V0+ME
-
Floxif family
-
Lumma family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-