General
-
Target
2024-12-25_ed84e59cfac17ecf89179342e8037f37_floxif_hijackloader_icedid
-
Size
3.2MB
-
Sample
241225-avpkpsskgr
-
MD5
ed84e59cfac17ecf89179342e8037f37
-
SHA1
4c6fd3b4bca02adaba2600edf38addcc08759834
-
SHA256
b3df9c88beedc07f4762f6f8ce0d6d59f07158625fbf0a0207c81904d2787b8d
-
SHA512
372724942fdeb7caebc40773c5fec5383429081d219a5496a37711b17c8811a3cddcb9341c52bf99265aaa969ef6c70c41aaf2778d05dcd205873f5f4f41933c
-
SSDEEP
49152:2LT5razB15YsBNMqxs9j7GvQDf536Ubmezbj2PSWMNXoenbtzNPBtpCW1zM0:2LMHXADyPSWMNXogPBtMW20
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-25_ed84e59cfac17ecf89179342e8037f37_floxif_hijackloader_icedid.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-25_ed84e59cfac17ecf89179342e8037f37_floxif_hijackloader_icedid.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-25_ed84e59cfac17ecf89179342e8037f37_floxif_hijackloader_icedid
-
Size
3.2MB
-
MD5
ed84e59cfac17ecf89179342e8037f37
-
SHA1
4c6fd3b4bca02adaba2600edf38addcc08759834
-
SHA256
b3df9c88beedc07f4762f6f8ce0d6d59f07158625fbf0a0207c81904d2787b8d
-
SHA512
372724942fdeb7caebc40773c5fec5383429081d219a5496a37711b17c8811a3cddcb9341c52bf99265aaa969ef6c70c41aaf2778d05dcd205873f5f4f41933c
-
SSDEEP
49152:2LT5razB15YsBNMqxs9j7GvQDf536Ubmezbj2PSWMNXoenbtzNPBtpCW1zM0:2LMHXADyPSWMNXogPBtMW20
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-