General
-
Target
2025-01-28_5f2fe1faf20fe76c64835b42a4ff1680_floxif_icedid
-
Size
2.0MB
-
Sample
250128-plre9sylax
-
MD5
5f2fe1faf20fe76c64835b42a4ff1680
-
SHA1
d7f9c09bdf3f1794947ba5a5f9a396afbc5222bc
-
SHA256
45eed741a3580d1993137f76b9ccaa1357ca4da951af104d2e20abdb887f5d21
-
SHA512
e2157dcb7be7d8142ac57ef996728ca47f20cc24e50d9000a6bbb76eb8a8f5266130a82c4c25cd6f1f1d32af01fcb7fe683a7c1ee91267c7a947fc55024346b3
-
SSDEEP
24576:aoKkdn8ycwm6yXWmlKVaQiXYL16GmzFj2Zn0FMloZ7SloZ7RloZ7rrEH7E:/d8ycQyGmlKVrY/z129aZuaZNaZ9
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-28_5f2fe1faf20fe76c64835b42a4ff1680_floxif_icedid.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-28_5f2fe1faf20fe76c64835b42a4ff1680_floxif_icedid.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2025-01-28_5f2fe1faf20fe76c64835b42a4ff1680_floxif_icedid
-
Size
2.0MB
-
MD5
5f2fe1faf20fe76c64835b42a4ff1680
-
SHA1
d7f9c09bdf3f1794947ba5a5f9a396afbc5222bc
-
SHA256
45eed741a3580d1993137f76b9ccaa1357ca4da951af104d2e20abdb887f5d21
-
SHA512
e2157dcb7be7d8142ac57ef996728ca47f20cc24e50d9000a6bbb76eb8a8f5266130a82c4c25cd6f1f1d32af01fcb7fe683a7c1ee91267c7a947fc55024346b3
-
SSDEEP
24576:aoKkdn8ycwm6yXWmlKVaQiXYL16GmzFj2Zn0FMloZ7SloZ7RloZ7rrEH7E:/d8ycQyGmlKVrY/z129aZuaZNaZ9
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-