General
-
Target
2025-04-24_aa4e22dc18b1f81944c8e28bed2a413f_amadey_elex_floxif_icedid_smoke-loader
-
Size
464KB
-
Sample
250424-dcqa3a1ps2
-
MD5
aa4e22dc18b1f81944c8e28bed2a413f
-
SHA1
327806188b7ecfefb2be2864706b6c7ead6905d0
-
SHA256
06ea6e6782ee8a408827cb8b09f531bd4dbb9f0825cde334140fcb686ceac781
-
SHA512
f67f1e002f335761ff211209d27e05ef84a1207dc20f72534b5913b0e8788fce0888b49b3235c877e8c4895f64dda0fc35b541adf6b6a9ff0343b0ead315c573
-
SSDEEP
12288:wo9rrT7kH1du/VBmzrB0yZaeZttefBjvrEH7W1:wo9rrau/VMh0+aeZwrEH7W1
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-24_aa4e22dc18b1f81944c8e28bed2a413f_amadey_elex_floxif_icedid_smoke-loader.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
2025-04-24_aa4e22dc18b1f81944c8e28bed2a413f_amadey_elex_floxif_icedid_smoke-loader.exe
Resource
win11-20250410-en
Malware Config
Targets
-
-
Target
2025-04-24_aa4e22dc18b1f81944c8e28bed2a413f_amadey_elex_floxif_icedid_smoke-loader
-
Size
464KB
-
MD5
aa4e22dc18b1f81944c8e28bed2a413f
-
SHA1
327806188b7ecfefb2be2864706b6c7ead6905d0
-
SHA256
06ea6e6782ee8a408827cb8b09f531bd4dbb9f0825cde334140fcb686ceac781
-
SHA512
f67f1e002f335761ff211209d27e05ef84a1207dc20f72534b5913b0e8788fce0888b49b3235c877e8c4895f64dda0fc35b541adf6b6a9ff0343b0ead315c573
-
SSDEEP
12288:wo9rrT7kH1du/VBmzrB0yZaeZttefBjvrEH7W1:wo9rrau/VMh0+aeZwrEH7W1
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-