General
-
Target
2024-12-19_d15cd75d88dd299d1478fd08fa0d009f_floxif_icedid
-
Size
2.2MB
-
Sample
241219-pn9pmatndl
-
MD5
d15cd75d88dd299d1478fd08fa0d009f
-
SHA1
4c68000d4f2123d2ba0e654762e6f13182976998
-
SHA256
a7d6f12e6322776dbd0a8d5e0005f1e4574edbf0b7cef68ab6c37fcd2a463a82
-
SHA512
af97b587d7c7078b658ff9866b25fc3cb7587367ad9d7a4017312d0826e2fdb8207588131868b0a4c263001b58227f1c3181f889deeb20b19279680c87b719da
-
SSDEEP
24576:2pc4NDD5GgXTCNB/7IZlRoZffWYMHs/D+Urb/cw1l7H0m+DXXsoroixNe0ywIrE4:VgXWiYt/zXRH07DXXPxkfj
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-19_d15cd75d88dd299d1478fd08fa0d009f_floxif_icedid.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2024-12-19_d15cd75d88dd299d1478fd08fa0d009f_floxif_icedid
-
Size
2.2MB
-
MD5
d15cd75d88dd299d1478fd08fa0d009f
-
SHA1
4c68000d4f2123d2ba0e654762e6f13182976998
-
SHA256
a7d6f12e6322776dbd0a8d5e0005f1e4574edbf0b7cef68ab6c37fcd2a463a82
-
SHA512
af97b587d7c7078b658ff9866b25fc3cb7587367ad9d7a4017312d0826e2fdb8207588131868b0a4c263001b58227f1c3181f889deeb20b19279680c87b719da
-
SSDEEP
24576:2pc4NDD5GgXTCNB/7IZlRoZffWYMHs/D+Urb/cw1l7H0m+DXXsoroixNe0ywIrE4:VgXWiYt/zXRH07DXXPxkfj
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-