General
-
Target
2024-12-15_9036c73798360c07061fd7aad4af2115_floxif_icedid
-
Size
2.8MB
-
Sample
241215-b1brgaskdj
-
MD5
9036c73798360c07061fd7aad4af2115
-
SHA1
6ad4ed7bba96f379d44dfb3f72b65509c4120066
-
SHA256
f59414691301db36f68f393aee99bc2818331d565744239743cde6bc440819a0
-
SHA512
6094dde684dc39abaa090521302b2cda455b4fe427b84d2e2695be32727a1141e44a394de55b4a2693110778031fd996ed8c3c287f10873fe609ab67dbe0a6c0
-
SSDEEP
49152:hF0CRYsaKXDVmOH9Gj/44aKXDVmOH9Gj8HaKXDVmOH9GjglO:hHuVKZpKOKQ
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-15_9036c73798360c07061fd7aad4af2115_floxif_icedid.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-15_9036c73798360c07061fd7aad4af2115_floxif_icedid
-
Size
2.8MB
-
MD5
9036c73798360c07061fd7aad4af2115
-
SHA1
6ad4ed7bba96f379d44dfb3f72b65509c4120066
-
SHA256
f59414691301db36f68f393aee99bc2818331d565744239743cde6bc440819a0
-
SHA512
6094dde684dc39abaa090521302b2cda455b4fe427b84d2e2695be32727a1141e44a394de55b4a2693110778031fd996ed8c3c287f10873fe609ab67dbe0a6c0
-
SSDEEP
49152:hF0CRYsaKXDVmOH9Gj/44aKXDVmOH9Gj8HaKXDVmOH9GjglO:hHuVKZpKOKQ
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-