General
-
Target
2024-12-21_14ad916181f193bcc3a81b4a772b64ae_floxif_hijackloader_icedid
-
Size
2.3MB
-
Sample
241221-apyanaxngv
-
MD5
14ad916181f193bcc3a81b4a772b64ae
-
SHA1
96aa9b71d7edb9fd450997a9b33d969fc05f3458
-
SHA256
babf06ee836fb1d1d4f753a0a0700b4db25c979cc0cf12e95529c50dd0c4a56f
-
SHA512
42a4305cb02e6fd50e45ac2805d0b3ca943fd04db6de4629e04e724cf7b86240a8ab6bd7518d7fa3d6037e2051c13493592b6b407cfe7bf59d9e4a55156c1155
-
SSDEEP
49152:lDWTmYPDrBYM650bmPHCyXbv4G9iHj58BR981E360fQp//T+fzezHp1G:lDWiQD9Yh50b6isjiHjWBR9udzHpc
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-21_14ad916181f193bcc3a81b4a772b64ae_floxif_hijackloader_icedid.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-21_14ad916181f193bcc3a81b4a772b64ae_floxif_hijackloader_icedid
-
Size
2.3MB
-
MD5
14ad916181f193bcc3a81b4a772b64ae
-
SHA1
96aa9b71d7edb9fd450997a9b33d969fc05f3458
-
SHA256
babf06ee836fb1d1d4f753a0a0700b4db25c979cc0cf12e95529c50dd0c4a56f
-
SHA512
42a4305cb02e6fd50e45ac2805d0b3ca943fd04db6de4629e04e724cf7b86240a8ab6bd7518d7fa3d6037e2051c13493592b6b407cfe7bf59d9e4a55156c1155
-
SSDEEP
49152:lDWTmYPDrBYM650bmPHCyXbv4G9iHj58BR981E360fQp//T+fzezHp1G:lDWiQD9Yh50b6isjiHjWBR9udzHpc
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-