General
-
Target
2024-12-23_6795e98345c077f24be4fdbc20989468_floxif_icedid
-
Size
4.5MB
-
Sample
241223-v3728swmbq
-
MD5
6795e98345c077f24be4fdbc20989468
-
SHA1
2b59ac75db0ec6646268aab14e6b5f21c1a05af4
-
SHA256
39905a4ca2fd49775b50c224281c9527a4680a0aaecde2771daa65cf9731f217
-
SHA512
2aa384d303ec1b00139bf964bdf53f9853364b9c7fc1f069ca14e9a1442c78a8909ef782ccbc256c8752e31c44eb9a24bef95f12144c7565096d35052ffe1b98
-
SSDEEP
49152:TiggVlbw6UtdwuAqdeD6x7EOTrODhJf85pdY9CNwuAqdeD6x7EOTrODhJf/RiVuM:ToVlbwHtdvAcl5pdvNvAcoRiMAz
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-23_6795e98345c077f24be4fdbc20989468_floxif_icedid.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2024-12-23_6795e98345c077f24be4fdbc20989468_floxif_icedid
-
Size
4.5MB
-
MD5
6795e98345c077f24be4fdbc20989468
-
SHA1
2b59ac75db0ec6646268aab14e6b5f21c1a05af4
-
SHA256
39905a4ca2fd49775b50c224281c9527a4680a0aaecde2771daa65cf9731f217
-
SHA512
2aa384d303ec1b00139bf964bdf53f9853364b9c7fc1f069ca14e9a1442c78a8909ef782ccbc256c8752e31c44eb9a24bef95f12144c7565096d35052ffe1b98
-
SSDEEP
49152:TiggVlbw6UtdwuAqdeD6x7EOTrODhJf85pdY9CNwuAqdeD6x7EOTrODhJf/RiVuM:ToVlbwHtdvAcl5pdvNvAcoRiMAz
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-