General
-
Target
2024-12-24_592a86d8e0199dc6cfb81b451bfd9b30_floxif_hijackloader_icedid
-
Size
3.2MB
-
Sample
241224-b6ds1sylgn
-
MD5
592a86d8e0199dc6cfb81b451bfd9b30
-
SHA1
7e76cbc1fc7f5c9a8627755c61bf9e7027e23b38
-
SHA256
d272ab2d344a5be0970bf001a3cb0840867d4617bd0d962eb54cbdf7c971db61
-
SHA512
a9d8418a55cf58ff0370698c4d9025b53e351556c172d7c279b6efd35c06b7ef55ddb638954a0974430ff7df60d1966e0c237206902a0193a105bd8ec8adf28c
-
SSDEEP
49152:2ST5razB15YsBNMqxs9j7GvQDf536Ubmezbj2PSWMNXoenbtDNPBtpCW1zMn:2SMHXADyPSWMNXocPBtMW2n
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-24_592a86d8e0199dc6cfb81b451bfd9b30_floxif_hijackloader_icedid.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
2024-12-24_592a86d8e0199dc6cfb81b451bfd9b30_floxif_hijackloader_icedid
-
Size
3.2MB
-
MD5
592a86d8e0199dc6cfb81b451bfd9b30
-
SHA1
7e76cbc1fc7f5c9a8627755c61bf9e7027e23b38
-
SHA256
d272ab2d344a5be0970bf001a3cb0840867d4617bd0d962eb54cbdf7c971db61
-
SHA512
a9d8418a55cf58ff0370698c4d9025b53e351556c172d7c279b6efd35c06b7ef55ddb638954a0974430ff7df60d1966e0c237206902a0193a105bd8ec8adf28c
-
SSDEEP
49152:2ST5razB15YsBNMqxs9j7GvQDf536Ubmezbj2PSWMNXoenbtDNPBtpCW1zMn:2SMHXADyPSWMNXocPBtMW2n
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-