General
-
Target
2024-12-12_951cf2d701d269abbb9b8cce20302e70_bkransomware_floxif_hijackloader_icedid_luca-stealer
-
Size
35.2MB
-
Sample
241212-aszynatpbz
-
MD5
951cf2d701d269abbb9b8cce20302e70
-
SHA1
39f82796e1bd8925aae38be15fd3f9b95dbb82fa
-
SHA256
08847ffb9af9125848b0fbb430ef4c1a25e47e971e57383ca933a645f7dbf470
-
SHA512
ef2d2319bf5965161d68191d10889b16e9593e74fbd1528c6183fdd5c5c58334c16c5891a32692315eccf22d0b25d3ccf4472555e55e39b1a2c9a516a3f71c9f
-
SSDEEP
196608:Ks1X7ZCXnao5D9P9CEaSfi7fkElaucB+MJrfcWx1yl02CCunv/YjDF+JUvkxgzNe:Ks1QXFKSfi7cElYutvkxCEdDGm5ht
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-12_951cf2d701d269abbb9b8cce20302e70_bkransomware_floxif_hijackloader_icedid_luca-stealer.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
2024-12-12_951cf2d701d269abbb9b8cce20302e70_bkransomware_floxif_hijackloader_icedid_luca-stealer
-
Size
35.2MB
-
MD5
951cf2d701d269abbb9b8cce20302e70
-
SHA1
39f82796e1bd8925aae38be15fd3f9b95dbb82fa
-
SHA256
08847ffb9af9125848b0fbb430ef4c1a25e47e971e57383ca933a645f7dbf470
-
SHA512
ef2d2319bf5965161d68191d10889b16e9593e74fbd1528c6183fdd5c5c58334c16c5891a32692315eccf22d0b25d3ccf4472555e55e39b1a2c9a516a3f71c9f
-
SSDEEP
196608:Ks1X7ZCXnao5D9P9CEaSfi7fkElaucB+MJrfcWx1yl02CCunv/YjDF+JUvkxgzNe:Ks1QXFKSfi7cElYutvkxCEdDGm5ht
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-