General
-
Target
2025-01-24_13ad3b7b75334f80c46ec26361a8fe1a_floxif_hijackloader_icedid
-
Size
3.0MB
-
Sample
250124-lb5ncsspbp
-
MD5
13ad3b7b75334f80c46ec26361a8fe1a
-
SHA1
639f8311c77fc48e42f07b35335f62f059447c82
-
SHA256
16e76e5a8014e9d1d68c47665145ac6f7f2d04ff78217659fa6003683a12e0b3
-
SHA512
ddee88c50090c9968e3e8df75a31684de378e3bc56adbbd2f0207d0dfb743fa26e37e5b6863246353aba303c418bacc3c3d70efa07b7266e64d50ef3f8654ac8
-
SSDEEP
24576:vKWbO6/Aft7z321eRjdjvQIjE4JDc1zr//rSuw3rEH7U:i0fAftn2CtWeuw
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-24_13ad3b7b75334f80c46ec26361a8fe1a_floxif_hijackloader_icedid.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2025-01-24_13ad3b7b75334f80c46ec26361a8fe1a_floxif_hijackloader_icedid
-
Size
3.0MB
-
MD5
13ad3b7b75334f80c46ec26361a8fe1a
-
SHA1
639f8311c77fc48e42f07b35335f62f059447c82
-
SHA256
16e76e5a8014e9d1d68c47665145ac6f7f2d04ff78217659fa6003683a12e0b3
-
SHA512
ddee88c50090c9968e3e8df75a31684de378e3bc56adbbd2f0207d0dfb743fa26e37e5b6863246353aba303c418bacc3c3d70efa07b7266e64d50ef3f8654ac8
-
SSDEEP
24576:vKWbO6/Aft7z321eRjdjvQIjE4JDc1zr//rSuw3rEH7U:i0fAftn2CtWeuw
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-