General
-
Target
2025-01-09_f428e559d67d1cd2be565bdc43548aa0_floxif_icedid
-
Size
2.6MB
-
Sample
250109-wljtraylhm
-
MD5
f428e559d67d1cd2be565bdc43548aa0
-
SHA1
47f577ac0628fa2e2545ffc31a0c6907b53f9146
-
SHA256
d23d1ce7ca28a5c8db341ddac73b59f1e67c84817e00e2459e17700a44d6f075
-
SHA512
f7a51102d0d14f78f981be4dddd5c855e405979978b87014cedce32dd006697e83d229e6e7a6799928cd610ea83b19e619f2501396613ae2eae34c89acc3159f
-
SSDEEP
24576:RpqzhKCykVFLvty85U+PzY0Ff5lAVElV7mTYSlLGaqlk0d6PSdTjo8ufJa/zfzk5:RpAh5Fy+zWOgLvqlk0gQTWfJa/jzkjkC
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-09_f428e559d67d1cd2be565bdc43548aa0_floxif_icedid.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-09_f428e559d67d1cd2be565bdc43548aa0_floxif_icedid.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2025-01-09_f428e559d67d1cd2be565bdc43548aa0_floxif_icedid
-
Size
2.6MB
-
MD5
f428e559d67d1cd2be565bdc43548aa0
-
SHA1
47f577ac0628fa2e2545ffc31a0c6907b53f9146
-
SHA256
d23d1ce7ca28a5c8db341ddac73b59f1e67c84817e00e2459e17700a44d6f075
-
SHA512
f7a51102d0d14f78f981be4dddd5c855e405979978b87014cedce32dd006697e83d229e6e7a6799928cd610ea83b19e619f2501396613ae2eae34c89acc3159f
-
SSDEEP
24576:RpqzhKCykVFLvty85U+PzY0Ff5lAVElV7mTYSlLGaqlk0d6PSdTjo8ufJa/zfzk5:RpAh5Fy+zWOgLvqlk0gQTWfJa/jzkjkC
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-