General
-
Target
2025-04-24_0a29202bcddbe654255af413e444feb7_akira_black-basta_elex_floxif_icedid_luca-stealer
-
Size
6.8MB
-
Sample
250424-vgs17axzgx
-
MD5
0a29202bcddbe654255af413e444feb7
-
SHA1
b4806ccfacf7c02f92a86dea544339a851d21004
-
SHA256
a120637feb64222771fca4d2a98754f47b2de1da31bf2eab4d9e173329ea905d
-
SHA512
e1813d0735ac6cd6402bc8d1cf1d38865cd0191543922a25e5d34609ff28ae1f840b8f07070a374a7d068984b69b3e4324b0594ee561884cbda483166d468e20
-
SSDEEP
98304:jo2mCHer41qXJVUR0LRn2ufOFJ//bHAKYmg77UQ1mfa/ews4VOp9m4:U4wXY0LRnHfqB7g7oQcfa/ewsWOps4
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-24_0a29202bcddbe654255af413e444feb7_akira_black-basta_elex_floxif_icedid_luca-stealer.exe
Resource
win10v2004-20250410-en
Malware Config
Targets
-
-
Target
2025-04-24_0a29202bcddbe654255af413e444feb7_akira_black-basta_elex_floxif_icedid_luca-stealer
-
Size
6.8MB
-
MD5
0a29202bcddbe654255af413e444feb7
-
SHA1
b4806ccfacf7c02f92a86dea544339a851d21004
-
SHA256
a120637feb64222771fca4d2a98754f47b2de1da31bf2eab4d9e173329ea905d
-
SHA512
e1813d0735ac6cd6402bc8d1cf1d38865cd0191543922a25e5d34609ff28ae1f840b8f07070a374a7d068984b69b3e4324b0594ee561884cbda483166d468e20
-
SSDEEP
98304:jo2mCHer41qXJVUR0LRn2ufOFJ//bHAKYmg77UQ1mfa/ews4VOp9m4:U4wXY0LRnHfqB7g7oQcfa/ewsWOps4
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1