General
-
Target
2025-01-26_d3bf33d98838b1b47e9aa2f02afe85f9_floxif_icedid_luca-stealer
-
Size
6.4MB
-
Sample
250126-b2xekaxlev
-
MD5
d3bf33d98838b1b47e9aa2f02afe85f9
-
SHA1
5d0ee448f8a8e16c4e622dea97ef1637391ad53c
-
SHA256
7c85e654b05b4a322675a7e392016c689dff7bfd4338ead54e7fc5bb2d645d6e
-
SHA512
6cae37dacbc6ac52abf2015a42d0ca3b9c32e1de1e94ff7cadeff3e4fb0215247c05141fb362ff947f0b24dc55199dd9b3ed31d569ee56e5de757c90c30592dc
-
SSDEEP
98304:3qJbc5wtz+kl/m5lifjc/PKkuExnaZ/l+7Y1rtJKCg8K:6Jf+y/mnifYKkbaZ/l+7Y1rtECg8K
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-26_d3bf33d98838b1b47e9aa2f02afe85f9_floxif_icedid_luca-stealer.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-26_d3bf33d98838b1b47e9aa2f02afe85f9_floxif_icedid_luca-stealer
-
Size
6.4MB
-
MD5
d3bf33d98838b1b47e9aa2f02afe85f9
-
SHA1
5d0ee448f8a8e16c4e622dea97ef1637391ad53c
-
SHA256
7c85e654b05b4a322675a7e392016c689dff7bfd4338ead54e7fc5bb2d645d6e
-
SHA512
6cae37dacbc6ac52abf2015a42d0ca3b9c32e1de1e94ff7cadeff3e4fb0215247c05141fb362ff947f0b24dc55199dd9b3ed31d569ee56e5de757c90c30592dc
-
SSDEEP
98304:3qJbc5wtz+kl/m5lifjc/PKkuExnaZ/l+7Y1rtJKCg8K:6Jf+y/mnifYKkbaZ/l+7Y1rtECg8K
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1