General
-
Target
2025-01-25_e425f5f9194656a6cc1e20bfa4976ae9_floxif_icedid
-
Size
662KB
-
Sample
250125-xt1b5sylep
-
MD5
e425f5f9194656a6cc1e20bfa4976ae9
-
SHA1
3940898ac9c5bea99590b1b6e28258a7943c92d8
-
SHA256
016ed2d11813c1afcb5e1df70eb06b179e7493fc19a520133ca7e267031db187
-
SHA512
e88fa94d0492a307578db53387fd32e86f5a813e09de3e272adec4603d7ab0fac2991bdfb3abe0d8d5f1b8cc012a85a8b875caac4b14bd4ace8922b8eacc5cc2
-
SSDEEP
12288:52jW6lBPryeITKzvEwUqm/VkRPwDaBjvrEH7XYVa:QjFBP0TKYfqEkBwQrEH7XYVa
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-25_e425f5f9194656a6cc1e20bfa4976ae9_floxif_icedid.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-25_e425f5f9194656a6cc1e20bfa4976ae9_floxif_icedid.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2025-01-25_e425f5f9194656a6cc1e20bfa4976ae9_floxif_icedid
-
Size
662KB
-
MD5
e425f5f9194656a6cc1e20bfa4976ae9
-
SHA1
3940898ac9c5bea99590b1b6e28258a7943c92d8
-
SHA256
016ed2d11813c1afcb5e1df70eb06b179e7493fc19a520133ca7e267031db187
-
SHA512
e88fa94d0492a307578db53387fd32e86f5a813e09de3e272adec4603d7ab0fac2991bdfb3abe0d8d5f1b8cc012a85a8b875caac4b14bd4ace8922b8eacc5cc2
-
SSDEEP
12288:52jW6lBPryeITKzvEwUqm/VkRPwDaBjvrEH7XYVa:QjFBP0TKYfqEkBwQrEH7XYVa
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-