General
-
Target
2025-01-11_f348a286f65b7cba33fabe2a66f9c5b7_floxif_hijackloader_icedid
-
Size
3.2MB
-
Sample
250111-ca9q9azrel
-
MD5
f348a286f65b7cba33fabe2a66f9c5b7
-
SHA1
9ff61a9636931bad0045d8dfd36d39be343c6dba
-
SHA256
29049e4054a1f629c792b559e2efa926ffc674485e13c993a7a61c6a406d0a71
-
SHA512
4c2c040b094cbd03dc2f8bd1ceb2df04fcc56f376a5165f1d1ea8599634a17a8ee9761f8de4acbb140e8119a2fe66dad80453a6e9dd2f74a4b5f4a5a8d746819
-
SSDEEP
49152:2KT5razB15YsBNMqxs9j7GvQDf536Ubmezbj2PSWMNXoRnbt3NPBtpCW1zMt:2KMHXADyPSWMNXoRPBtMW2t
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-11_f348a286f65b7cba33fabe2a66f9c5b7_floxif_hijackloader_icedid.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-11_f348a286f65b7cba33fabe2a66f9c5b7_floxif_hijackloader_icedid
-
Size
3.2MB
-
MD5
f348a286f65b7cba33fabe2a66f9c5b7
-
SHA1
9ff61a9636931bad0045d8dfd36d39be343c6dba
-
SHA256
29049e4054a1f629c792b559e2efa926ffc674485e13c993a7a61c6a406d0a71
-
SHA512
4c2c040b094cbd03dc2f8bd1ceb2df04fcc56f376a5165f1d1ea8599634a17a8ee9761f8de4acbb140e8119a2fe66dad80453a6e9dd2f74a4b5f4a5a8d746819
-
SSDEEP
49152:2KT5razB15YsBNMqxs9j7GvQDf536Ubmezbj2PSWMNXoRnbt3NPBtpCW1zMt:2KMHXADyPSWMNXoRPBtMW2t
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-