General
-
Target
2024-12-23_e50cfe54f7c28c3c582af3f37d73fcc2_floxif_hijackloader_icedid
-
Size
3.2MB
-
Sample
241223-avq4jasmh1
-
MD5
e50cfe54f7c28c3c582af3f37d73fcc2
-
SHA1
bb8b44b8cf4456c9bc841d160847da1754557d98
-
SHA256
7157639f7f15c70da40c5caa7a92174fd6854b1cb7f80c6580b8fbf5dc0aa520
-
SHA512
1a140bd4afc5cddeaaef253e821d1a3f21ae817b24402ee1760b4a1efa0ae2ec9486927ed84ed210d761392652d2d75f142084a37b6fa5e482aaff1b713d3a56
-
SSDEEP
49152:2KlrazB15YsBNMqxs9j7GvQDf536Ubmezbj2PSWMNXoenbthNPBtpCW1zME:2KEHXADyPSWMNXo+PBtMW2E
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-23_e50cfe54f7c28c3c582af3f37d73fcc2_floxif_hijackloader_icedid.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
2024-12-23_e50cfe54f7c28c3c582af3f37d73fcc2_floxif_hijackloader_icedid
-
Size
3.2MB
-
MD5
e50cfe54f7c28c3c582af3f37d73fcc2
-
SHA1
bb8b44b8cf4456c9bc841d160847da1754557d98
-
SHA256
7157639f7f15c70da40c5caa7a92174fd6854b1cb7f80c6580b8fbf5dc0aa520
-
SHA512
1a140bd4afc5cddeaaef253e821d1a3f21ae817b24402ee1760b4a1efa0ae2ec9486927ed84ed210d761392652d2d75f142084a37b6fa5e482aaff1b713d3a56
-
SSDEEP
49152:2KlrazB15YsBNMqxs9j7GvQDf536Ubmezbj2PSWMNXoenbthNPBtpCW1zME:2KEHXADyPSWMNXo+PBtMW2E
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-