MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 02bba588a27c4981983117d23945d68b369c83210cfa783b02655eabdba49c18. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 02bba588a27c4981983117d23945d68b369c83210cfa783b02655eabdba49c18
SHA3-384 hash: b64f01f51e1da6eea8bc7c80a326b945f447b28cf8f48b9bd4e757ddd7741abacf923fbc0b1c4b547e9225197990d044
SHA1 hash: 1df92eead922fc8f9fd573b45746d4f8c3513158
MD5 hash: 78c74247e97c0e7486026442408046d5
humanhash: mango-fourteen-rugby-jersey
File name:kfa5.bin
Download: download sample
Signature IcedID
File size:287'232 bytes
First seen:2020-07-24 18:05:51 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 3703dfa0a39082c156a9636a1a7d9f2a (15 x IcedID)
ssdeep 6144://gX8DFFxW+Bn8Fj7W7VRicNAOPXWdqMBNNH4SzI:wKTxW+B8FyR1KxI
Threatray 871 similar samples on MalwareBazaar
TLSH 8754AF40BCC1C473E97E16350975DAA5197DBC210A60DEAFB7D84E7E4F32280A621F7A
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
1
# of downloads :
106
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
64 / 100
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.IcedID
Status:
Malicious
First seen:
2020-07-24 18:07:05 UTC
AV detection:
19 of 29 (65.52%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments