MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0aa2727753d68654ada04a86531c216b15754fe0fabb38bf5db9c9bd4d8933a8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 0aa2727753d68654ada04a86531c216b15754fe0fabb38bf5db9c9bd4d8933a8
SHA3-384 hash: f573a0ca0b3f9ae7dc4a904663b3af0122570fb245eaefb14a3403dd1844bbef74e6b49dea258ee922f873f6ef9f033c
SHA1 hash: 8700616ac6d73f84e615e7a33d42ac96a7a3b535
MD5 hash: eaee3f4ddd608ce362f8dcdfca40aad6
humanhash: wyoming-shade-arkansas-south
File name:temp.tmp
Download: download sample
Signature IcedID
File size:172'032 bytes
First seen:2020-08-13 18:48:26 UTC
Last seen:2020-08-13 19:43:48 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 7dba58da61785bfb99de571c94414d2d (12 x IcedID, 2 x Gozi)
ssdeep 1536:hF+KOaaJzE/2b3RDdJQ5ZU5m/Yzs/8OXmlWunuZtH2WY8+pt6PytN8bUMWf:hF6JAkhR2Ssfm0tH/+poPANjTf
Threatray 620 similar samples on MalwareBazaar
TLSH 1BF37D113AE28071F267063E8260CA51CF7D39537ABED78FA7D4079EE9639805B313A5
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
2
# of downloads :
165
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending a custom TCP request
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
60 / 100
Signature
Contains functionality to detect hardware virtualization (CPUID execution measurement)
System process connects to network (likely due to code injection or exploit)
Yara detected IcedID
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 266281 Sample: temp.tmp Startdate: 15/08/2020 Architecture: WINDOWS Score: 60 19 www.oracle.com 2->19 35 Yara detected IcedID 2->35 7 loaddll32.exe 1 2->7         started        signatures3 process4 process5 9 rundll32.exe 7->9         started        13 rundll32.exe 7->13         started        15 rundll32.exe 7->15         started        17 rundll32.exe 7->17         started        dnsIp6 21 s.twitter.com 104.244.42.131, 443, 49763 TWITTERUS United States 9->21 23 192.168.2.1 unknown unknown 9->23 29 7 other IPs or domains 9->29 37 System process connects to network (likely due to code injection or exploit) 9->37 39 Contains functionality to detect hardware virtualization (CPUID execution measurement) 9->39 25 www.oracle.com 13->25 27 support.oracle.com 13->27 31 2 other IPs or domains 15->31 33 2 other IPs or domains 17->33 signatures7
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-08-13 18:41:23 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments