General
-
Target
2024-12-19_636cc83501292a7a5d746b35494171a5_floxif_hijackloader_icedid
-
Size
3.2MB
-
Sample
241219-v271vawqdv
-
MD5
636cc83501292a7a5d746b35494171a5
-
SHA1
460cbbc5b21a8c9ec851c7d63875bf0b433d99ca
-
SHA256
c216a6bd9bddbda47976ac8f2591d6d85a4b84e8a3f19d7eff774adba38f7525
-
SHA512
1b23af415e0759f0bb718fe2be9293f4c5b2e244c0131fe3132c2f6b03281b311b62e7b76cc0daecee458a975d5f3a2536473bfb4212207936a6f800de6d7732
-
SSDEEP
49152:2KT5razB15YsBNMqxs9j7GvQDf536Ubmezbj2PSWMNXobnbtfNPBtpCW1zMm:2KMHXADyPSWMNXobPBtMW2m
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-19_636cc83501292a7a5d746b35494171a5_floxif_hijackloader_icedid.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-19_636cc83501292a7a5d746b35494171a5_floxif_hijackloader_icedid.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-19_636cc83501292a7a5d746b35494171a5_floxif_hijackloader_icedid
-
Size
3.2MB
-
MD5
636cc83501292a7a5d746b35494171a5
-
SHA1
460cbbc5b21a8c9ec851c7d63875bf0b433d99ca
-
SHA256
c216a6bd9bddbda47976ac8f2591d6d85a4b84e8a3f19d7eff774adba38f7525
-
SHA512
1b23af415e0759f0bb718fe2be9293f4c5b2e244c0131fe3132c2f6b03281b311b62e7b76cc0daecee458a975d5f3a2536473bfb4212207936a6f800de6d7732
-
SSDEEP
49152:2KT5razB15YsBNMqxs9j7GvQDf536Ubmezbj2PSWMNXobnbtfNPBtpCW1zMm:2KMHXADyPSWMNXobPBtMW2m
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-