General
-
Target
2024-12-25_b2f1338934f332ffcf21d6a91f13d61e_floxif_hijackloader_icedid
-
Size
3.2MB
-
Sample
241225-w588raskaw
-
MD5
b2f1338934f332ffcf21d6a91f13d61e
-
SHA1
e0644b5ada15c183584f5f0649fe10964200c0b7
-
SHA256
e22438d7896f1c499d61e306b86a8d31ba1705310bf9c122467a995321710724
-
SHA512
53d5fd03a80a2466c7e61ae3d6289d6e724eeb257e4bd409d5ffbfdc96a30429edc0f942e4a2472ad171ebe4f7aadc4d2e2456089407092eeeb8467bc08bbd63
-
SSDEEP
49152:2KT5razB15YsBNMqxs9j7GvQDf536UbmezbO2PSWMNXoenbtxNPBtpCW1zMc:2KMHXAD9PSWMNXoePBtMW2c
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-25_b2f1338934f332ffcf21d6a91f13d61e_floxif_hijackloader_icedid.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-25_b2f1338934f332ffcf21d6a91f13d61e_floxif_hijackloader_icedid
-
Size
3.2MB
-
MD5
b2f1338934f332ffcf21d6a91f13d61e
-
SHA1
e0644b5ada15c183584f5f0649fe10964200c0b7
-
SHA256
e22438d7896f1c499d61e306b86a8d31ba1705310bf9c122467a995321710724
-
SHA512
53d5fd03a80a2466c7e61ae3d6289d6e724eeb257e4bd409d5ffbfdc96a30429edc0f942e4a2472ad171ebe4f7aadc4d2e2456089407092eeeb8467bc08bbd63
-
SSDEEP
49152:2KT5razB15YsBNMqxs9j7GvQDf536UbmezbO2PSWMNXoenbtxNPBtpCW1zMc:2KMHXAD9PSWMNXoePBtMW2c
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-