MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 01fcaac089adb57be61812b11860fb264cad44b7e3a60b3519ff964a9f459b73. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 01fcaac089adb57be61812b11860fb264cad44b7e3a60b3519ff964a9f459b73
SHA3-384 hash: 53514fd107234cebfe6471dbb8035780e63c1c403a999bf41563a85e9592dcee5ebe9e3d75e2e4f72f49f0a5374a4db4
SHA1 hash: 087bb2426cece0485d8559347ac8c1799ef7942f
MD5 hash: e434a4494661f2e8a5b74332c6630b67
humanhash: louisiana-wisconsin-jersey-arizona
File name:Scan_Invoice_12-09#15.msi
Download: download sample
Signature IcedID
File size:843'776 bytes
First seen:2022-12-10 05:16:07 UTC
Last seen:2022-12-10 06:29:05 UTC
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 24576:GHL079mTn3Tp9LolM0aID/kJAHCsWPXoPcTPbgrQlRNKIg8gx/:Gr07a3kM0osWPXoPcTPbgrQlRNKIg8gx
Threatray 1'260 similar samples on MalwareBazaar
TLSH T144053A13E37210E5D8B6C2398A677627B9F13C2543349BD75710762A4F72BF0AA3A385
TrID 53.7% (.MST) Windows SDK Setup Transform script (61000/1/5)
39.2% (.MSP) Windows Installer Patch (44509/10/5)
7.0% (.) Generic OLE2 / Multistream Compound (8000/1)
Reporter malware_traffic
Tags:BokBot broskabrwaf.com IcedID msi password: u753

Intelligence


File Origin
# of uploads :
3
# of downloads :
142
Origin country :
US US
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed rundll32.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Heracles
Status:
Malicious
First seen:
2022-12-10 05:17:09 UTC
File Type:
Binary (Archive)
Extracted files:
32
AV detection:
6 of 39 (15.38%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Enumerates connected drives
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments