General

  • Target

    2025-01-10_a5bbd91c4862e5a99e9f28177532c94b_floxif_icedid_luca-stealer

  • Size

    6.8MB

  • Sample

    250110-cgp1eszraj

  • MD5

    a5bbd91c4862e5a99e9f28177532c94b

  • SHA1

    35bf540dafdfc811a356ba10f070b5c3241a3f03

  • SHA256

    ed5a63f98a08954c1e3ea6be8025bb3f896491fe78f09c84c23b08164028dc76

  • SHA512

    ba6aac652e42b8d6571d6ed5b9bd673f4ec330de6219e24f451c8a05e648068e8c2ac5edc5c387a2adefb2ec4fc05ca2ffee777ebf03cc4f68ffcda2d817d290

  • SSDEEP

    98304:jo2mCHer41qfJVUR0LRn2ufOFa//bHAKYmg77UQ1mfa/ews4VOp9mL:U4wfY0LRnHfqE7g7oQcfa/ewsWOpsL

Malware Config

Targets

    • Target

      2025-01-10_a5bbd91c4862e5a99e9f28177532c94b_floxif_icedid_luca-stealer

    • Size

      6.8MB

    • MD5

      a5bbd91c4862e5a99e9f28177532c94b

    • SHA1

      35bf540dafdfc811a356ba10f070b5c3241a3f03

    • SHA256

      ed5a63f98a08954c1e3ea6be8025bb3f896491fe78f09c84c23b08164028dc76

    • SHA512

      ba6aac652e42b8d6571d6ed5b9bd673f4ec330de6219e24f451c8a05e648068e8c2ac5edc5c387a2adefb2ec4fc05ca2ffee777ebf03cc4f68ffcda2d817d290

    • SSDEEP

      98304:jo2mCHer41qfJVUR0LRn2ufOFa//bHAKYmg77UQ1mfa/ews4VOp9mL:U4wfY0LRnHfqE7g7oQcfa/ewsWOpsL

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks