General
-
Target
2024-12-31_a5eb1fc73020a814a8da72e87cca1961_floxif_icedid_luca-stealer
-
Size
2.1MB
-
Sample
241231-ca2ewa1kcx
-
MD5
a5eb1fc73020a814a8da72e87cca1961
-
SHA1
63a59c126ff2b4f6b5e669c9b25a39e09da1dd47
-
SHA256
dad706fca91377098d95c160b972acb083dc8916a14496d5eccc4fed8be7f1f5
-
SHA512
e81695222073247d19056c20261b910cdeaa54cae88306d80aee54f5e2c33eff72c71bcf7ba55c702ea8d432a1d7782b373a3f9331db0982db8cfe9610f00073
-
SSDEEP
49152:ccsft9wXgPKNJ9l4MWTV1ZOf2ACd/Ixees+iGq:psft9zQJ9l4MWT9ACd/cees+1q
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-31_a5eb1fc73020a814a8da72e87cca1961_floxif_icedid_luca-stealer.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-31_a5eb1fc73020a814a8da72e87cca1961_floxif_icedid_luca-stealer.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-31_a5eb1fc73020a814a8da72e87cca1961_floxif_icedid_luca-stealer
-
Size
2.1MB
-
MD5
a5eb1fc73020a814a8da72e87cca1961
-
SHA1
63a59c126ff2b4f6b5e669c9b25a39e09da1dd47
-
SHA256
dad706fca91377098d95c160b972acb083dc8916a14496d5eccc4fed8be7f1f5
-
SHA512
e81695222073247d19056c20261b910cdeaa54cae88306d80aee54f5e2c33eff72c71bcf7ba55c702ea8d432a1d7782b373a3f9331db0982db8cfe9610f00073
-
SSDEEP
49152:ccsft9wXgPKNJ9l4MWTV1ZOf2ACd/Ixees+iGq:psft9zQJ9l4MWT9ACd/cees+1q
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-