General
-
Target
2025-01-10_a5bbd91c4862e5a99e9f28177532c94b_floxif_icedid_luca-stealer
-
Size
6.8MB
-
Sample
250110-cgp1eszraj
-
MD5
a5bbd91c4862e5a99e9f28177532c94b
-
SHA1
35bf540dafdfc811a356ba10f070b5c3241a3f03
-
SHA256
ed5a63f98a08954c1e3ea6be8025bb3f896491fe78f09c84c23b08164028dc76
-
SHA512
ba6aac652e42b8d6571d6ed5b9bd673f4ec330de6219e24f451c8a05e648068e8c2ac5edc5c387a2adefb2ec4fc05ca2ffee777ebf03cc4f68ffcda2d817d290
-
SSDEEP
98304:jo2mCHer41qfJVUR0LRn2ufOFa//bHAKYmg77UQ1mfa/ews4VOp9mL:U4wfY0LRnHfqE7g7oQcfa/ewsWOpsL
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-10_a5bbd91c4862e5a99e9f28177532c94b_floxif_icedid_luca-stealer.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-10_a5bbd91c4862e5a99e9f28177532c94b_floxif_icedid_luca-stealer
-
Size
6.8MB
-
MD5
a5bbd91c4862e5a99e9f28177532c94b
-
SHA1
35bf540dafdfc811a356ba10f070b5c3241a3f03
-
SHA256
ed5a63f98a08954c1e3ea6be8025bb3f896491fe78f09c84c23b08164028dc76
-
SHA512
ba6aac652e42b8d6571d6ed5b9bd673f4ec330de6219e24f451c8a05e648068e8c2ac5edc5c387a2adefb2ec4fc05ca2ffee777ebf03cc4f68ffcda2d817d290
-
SSDEEP
98304:jo2mCHer41qfJVUR0LRn2ufOFa//bHAKYmg77UQ1mfa/ews4VOp9mL:U4wfY0LRnHfqE7g7oQcfa/ewsWOpsL
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1