General
-
Target
2024-12-24_3570000a32b7121c1b2b62711b45a229_floxif_icedid
-
Size
4.5MB
-
Sample
241224-b7g7tsymbr
-
MD5
3570000a32b7121c1b2b62711b45a229
-
SHA1
22342204de5456e5c90e77421e5a690a8bab3760
-
SHA256
6ee50de9b737d5104e515f6c7a9cc747925e779d67e6968fee0aaaff54cb41ce
-
SHA512
fb5d2309368cca18f236752569397352496f9c68819b559f4a183604d02322850e93b5327f1d516cfc511f47a3cd5e38a8f4a47a7113af212a37ff1d2c7cfb8b
-
SSDEEP
49152:1ggVlb16UtdwuAqdeD6x7EOTrODhJf85pdY9CNwuAqdeD6x7EOTrODhJf/RiVuAz:1Vlb1HtdvAcl5pdvNvAcoRiMAz
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-24_3570000a32b7121c1b2b62711b45a229_floxif_icedid.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
2024-12-24_3570000a32b7121c1b2b62711b45a229_floxif_icedid
-
Size
4.5MB
-
MD5
3570000a32b7121c1b2b62711b45a229
-
SHA1
22342204de5456e5c90e77421e5a690a8bab3760
-
SHA256
6ee50de9b737d5104e515f6c7a9cc747925e779d67e6968fee0aaaff54cb41ce
-
SHA512
fb5d2309368cca18f236752569397352496f9c68819b559f4a183604d02322850e93b5327f1d516cfc511f47a3cd5e38a8f4a47a7113af212a37ff1d2c7cfb8b
-
SSDEEP
49152:1ggVlb16UtdwuAqdeD6x7EOTrODhJf85pdY9CNwuAqdeD6x7EOTrODhJf/RiVuAz:1Vlb1HtdvAcl5pdvNvAcoRiMAz
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-