General
-
Target
2024-12-12_5b3f7c8a56989cdee73bc1547a7a91b0_floxif_hijackloader_icedid
-
Size
3.2MB
-
Sample
241212-xqksaatpcs
-
MD5
5b3f7c8a56989cdee73bc1547a7a91b0
-
SHA1
c2080579a1b09994ce3f8bce14e97dc21c12e3d9
-
SHA256
7b1f798519155807b2d7716b3402cb51ca4c6c6435857c5d7aa6c53e9c59641f
-
SHA512
5ca05535256aab9a730f7686940a22b536e7f2561ca1048f115d84a956206a740ae9f683f92f253832245bc2e81c8adc89789e15292611614b9989645de3581b
-
SSDEEP
49152:2KT5razB15YsBNMqxs9j7GvQDf536Ubmezbj2PSWMNXoqnbtuNPBtpCW1zMm:2KMHXADyPSWMNXoHPBtMW2m
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-12_5b3f7c8a56989cdee73bc1547a7a91b0_floxif_hijackloader_icedid.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
2024-12-12_5b3f7c8a56989cdee73bc1547a7a91b0_floxif_hijackloader_icedid
-
Size
3.2MB
-
MD5
5b3f7c8a56989cdee73bc1547a7a91b0
-
SHA1
c2080579a1b09994ce3f8bce14e97dc21c12e3d9
-
SHA256
7b1f798519155807b2d7716b3402cb51ca4c6c6435857c5d7aa6c53e9c59641f
-
SHA512
5ca05535256aab9a730f7686940a22b536e7f2561ca1048f115d84a956206a740ae9f683f92f253832245bc2e81c8adc89789e15292611614b9989645de3581b
-
SSDEEP
49152:2KT5razB15YsBNMqxs9j7GvQDf536Ubmezbj2PSWMNXoqnbtuNPBtpCW1zMm:2KMHXADyPSWMNXoHPBtMW2m
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-