General
-
Target
2024-12-22_9bea6e095e238b46d7fa7b78a5370a1e_floxif_hijackloader_icedid
-
Size
3.2MB
-
Sample
241222-vzxr4avlgr
-
MD5
9bea6e095e238b46d7fa7b78a5370a1e
-
SHA1
4919638ff111f2f11f5868c3120506185fc50cc7
-
SHA256
7d50e38c8ee7df96a443f72f64ccf635b12e2999341457856ea440c00ffb8bd5
-
SHA512
1a8ff9f5661fac9605e57eb014f9f30e16d0787058edacf2ff990de442e4f713646eb897bda392d0731d6044096e98f01c5102574f964205d72254b5cce5c576
-
SSDEEP
49152:jT5razB15YsBNMqxs9j7GvQDf536Ubmezbj2PSWMNXoenbtINPBtpCW1zMX:jMHXADyPSWMNXohPBtMW2X
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-22_9bea6e095e238b46d7fa7b78a5370a1e_floxif_hijackloader_icedid.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-22_9bea6e095e238b46d7fa7b78a5370a1e_floxif_hijackloader_icedid
-
Size
3.2MB
-
MD5
9bea6e095e238b46d7fa7b78a5370a1e
-
SHA1
4919638ff111f2f11f5868c3120506185fc50cc7
-
SHA256
7d50e38c8ee7df96a443f72f64ccf635b12e2999341457856ea440c00ffb8bd5
-
SHA512
1a8ff9f5661fac9605e57eb014f9f30e16d0787058edacf2ff990de442e4f713646eb897bda392d0731d6044096e98f01c5102574f964205d72254b5cce5c576
-
SSDEEP
49152:jT5razB15YsBNMqxs9j7GvQDf536Ubmezbj2PSWMNXoenbtINPBtpCW1zMX:jMHXADyPSWMNXohPBtMW2X
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-