General
-
Target
2025-02-07_0cce1a4a4108024308704b6b312be8af_cobalt-strike_floxif_icedid
-
Size
698KB
-
Sample
250207-xdpwgasnbv
-
MD5
0cce1a4a4108024308704b6b312be8af
-
SHA1
568d43abd0fcc8fd4f2a804c25279d7eed554f72
-
SHA256
7f2e96eb1060f89aefb5fcfb60e328af7fdaec521b07249000085718f3cc3fe5
-
SHA512
60f430114257fc65fbb03796af91d4264bc1826a125b3efc292a6df381a82d11a52b3e8a10caccdf3490bdf43c964ccdda3dc630da26e3acb6776ac9e6ac8893
-
SSDEEP
12288:c969zPKSxhaQQs7INuyGObNwDumO/VaOcEUQcFiu0JOBjvrEH712d:1zPb/aQQsDamarcB0JorEH712d
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-07_0cce1a4a4108024308704b6b312be8af_cobalt-strike_floxif_icedid.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2025-02-07_0cce1a4a4108024308704b6b312be8af_cobalt-strike_floxif_icedid
-
Size
698KB
-
MD5
0cce1a4a4108024308704b6b312be8af
-
SHA1
568d43abd0fcc8fd4f2a804c25279d7eed554f72
-
SHA256
7f2e96eb1060f89aefb5fcfb60e328af7fdaec521b07249000085718f3cc3fe5
-
SHA512
60f430114257fc65fbb03796af91d4264bc1826a125b3efc292a6df381a82d11a52b3e8a10caccdf3490bdf43c964ccdda3dc630da26e3acb6776ac9e6ac8893
-
SSDEEP
12288:c969zPKSxhaQQs7INuyGObNwDumO/VaOcEUQcFiu0JOBjvrEH712d:1zPb/aQQsDamarcB0JorEH712d
-
Floxif family
-
Detects Floxif payload
-
Downloads MZ/PE file
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-