General
-
Target
2025-02-03_97a45cea8429ad5bed27f1fa8aef2b0f_floxif_icedid_luca-stealer
-
Size
4.6MB
-
Sample
250203-pqmb4s1lc1
-
MD5
97a45cea8429ad5bed27f1fa8aef2b0f
-
SHA1
860a95d0798c10dea57d71068a3b432ce2bd8c79
-
SHA256
937206492ef148e89a8c73a5bbe78825022fe976217e57c10b4b260e84ffe7ef
-
SHA512
150da2e140d2d6b7c34cc5d3d5f629a3911057c42f44b5c4e74d114743b56f8378fe254f5a77445a6eb8ca50cb22ea6c0696b2f7f76adf1b03cb98fe8a5643de
-
SSDEEP
98304:Gz3Zv0elbHRP20SBKoGh9KHzlXzifmXuxFOJLcz8WgOpZbSF:UZcfrRF0Ycz8WgOpZbSF
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-03_97a45cea8429ad5bed27f1fa8aef2b0f_floxif_icedid_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-03_97a45cea8429ad5bed27f1fa8aef2b0f_floxif_icedid_luca-stealer.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
2025-02-03_97a45cea8429ad5bed27f1fa8aef2b0f_floxif_icedid_luca-stealer
-
Size
4.6MB
-
MD5
97a45cea8429ad5bed27f1fa8aef2b0f
-
SHA1
860a95d0798c10dea57d71068a3b432ce2bd8c79
-
SHA256
937206492ef148e89a8c73a5bbe78825022fe976217e57c10b4b260e84ffe7ef
-
SHA512
150da2e140d2d6b7c34cc5d3d5f629a3911057c42f44b5c4e74d114743b56f8378fe254f5a77445a6eb8ca50cb22ea6c0696b2f7f76adf1b03cb98fe8a5643de
-
SSDEEP
98304:Gz3Zv0elbHRP20SBKoGh9KHzlXzifmXuxFOJLcz8WgOpZbSF:UZcfrRF0Ycz8WgOpZbSF
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-