General
-
Target
2025-01-02_156af6d0ef95685f42d016449e50676f_floxif_icedid
-
Size
480KB
-
Sample
250102-x31n9ssmdv
-
MD5
156af6d0ef95685f42d016449e50676f
-
SHA1
4234d76c9cd03d8c0d60f91edceb9d0c8989e357
-
SHA256
b1510ba57e8e1c2c1cce3755679d35835bd839e8f8f5c774fc41978de46d7f65
-
SHA512
ff3e1cc73fea72f250ba7ab5a84d78f2124c89f5d11bda5622dacb279b0fe63382ac3cff74147eba87e5d346cd338510edb7ea0c4bbb214b6820513cab8ca428
-
SSDEEP
12288:lgEBbMtGUWYmeJJsSW6Q2fQTqeaU1Yh1NVZqbRgPBjvrEH7/:y4MYUWY/sRUrEH7/
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-02_156af6d0ef95685f42d016449e50676f_floxif_icedid.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
2025-01-02_156af6d0ef95685f42d016449e50676f_floxif_icedid
-
Size
480KB
-
MD5
156af6d0ef95685f42d016449e50676f
-
SHA1
4234d76c9cd03d8c0d60f91edceb9d0c8989e357
-
SHA256
b1510ba57e8e1c2c1cce3755679d35835bd839e8f8f5c774fc41978de46d7f65
-
SHA512
ff3e1cc73fea72f250ba7ab5a84d78f2124c89f5d11bda5622dacb279b0fe63382ac3cff74147eba87e5d346cd338510edb7ea0c4bbb214b6820513cab8ca428
-
SSDEEP
12288:lgEBbMtGUWYmeJJsSW6Q2fQTqeaU1Yh1NVZqbRgPBjvrEH7/:y4MYUWY/sRUrEH7/
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-