General
-
Target
2024-12-30_179be0b231d92f298da5a3e84ce5cbcf_floxif_hijackloader_icedid
-
Size
3.2MB
-
Sample
241230-aqhlla1qbs
-
MD5
179be0b231d92f298da5a3e84ce5cbcf
-
SHA1
d64097d431bdcd5c2a06c85d619127d29535306b
-
SHA256
d37963f2e345216f2bc9a73a62332c22347acc818f88d1ba57527b04373a2394
-
SHA512
97f93625744e0fe515b5d5e2baaeb02eaef625e2c49f976c9c3ac769be889784f92027a1c18c88b34db8975ed0ad8bbc18aa55e35b753352d961df095f5b5aea
-
SSDEEP
49152:2KT5razB15YsBNMqxs9j7GvQDf536Ubmezbj2PSWMNXoenbtXNPEtpCW1zMO:2KMHXADyPSWMNXowPEtMW2O
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-30_179be0b231d92f298da5a3e84ce5cbcf_floxif_hijackloader_icedid.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-30_179be0b231d92f298da5a3e84ce5cbcf_floxif_hijackloader_icedid.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-30_179be0b231d92f298da5a3e84ce5cbcf_floxif_hijackloader_icedid
-
Size
3.2MB
-
MD5
179be0b231d92f298da5a3e84ce5cbcf
-
SHA1
d64097d431bdcd5c2a06c85d619127d29535306b
-
SHA256
d37963f2e345216f2bc9a73a62332c22347acc818f88d1ba57527b04373a2394
-
SHA512
97f93625744e0fe515b5d5e2baaeb02eaef625e2c49f976c9c3ac769be889784f92027a1c18c88b34db8975ed0ad8bbc18aa55e35b753352d961df095f5b5aea
-
SSDEEP
49152:2KT5razB15YsBNMqxs9j7GvQDf536Ubmezbj2PSWMNXoenbtXNPEtpCW1zMO:2KMHXADyPSWMNXowPEtMW2O
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-