MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 13c850f0419cd63e6eda74d134d468edf9f2d9d13cbbc655fbd36e89c6b1e46f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 13c850f0419cd63e6eda74d134d468edf9f2d9d13cbbc655fbd36e89c6b1e46f
SHA3-384 hash: 0b2916ff32d49e5cc4c39532c5bb6ecdf7e3b2a51ac6d4e00bb2310b6bde549b75e16997e808128a146aafe03428778c
SHA1 hash: 4ece84bc3a57e7ab3959cea9f3586d7588c6fac3
MD5 hash: 44c311010aa930d0772843d4cba5581a
humanhash: foxtrot-lactose-blossom-diet
File name:bda43.pdf
Download: download sample
Signature IcedID
File size:273'410 bytes
First seen:2020-09-23 23:50:20 UTC
Last seen:2020-09-24 01:02:24 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 6749c1906c573b3a2cc9309078bca481 (21 x IcedID)
ssdeep 3072:WKCvsQ1ZkyvvaVP5wW760YyUu5VELUUtg7+HqOtTsTERJLGvumPOUIrLeAg0FujH:LQrkoCKvytr7UtkiBvPLiAOg3kaeXV6y
Threatray 311 similar samples on MalwareBazaar
TLSH 0D449E1179D2C0B2E5FF1A3409BAD6A50ABD79200E60CDABB7D40B2D4F761C1DE25E36
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
2
# of downloads :
167
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending a custom TCP request
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
n/a
Score:
21 / 100
Signature
a
c
d
e
f
h
I
l
m
n
o
p
s
t
u
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 289381 Sample: bda43.pdf Startdate: 24/09/2020 Architecture: WINDOWS Score: 21 23 Initial sample is a PE file and has a suspicious name 2->23 7 AcroRd32.exe 37 2->7         started        process3 process4 9 RdrCEF.exe 45 7->9         started        12 AcroRd32.exe 2 5 7->12         started        dnsIp5 19 192.168.2.1 unknown unknown 9->19 14 RdrCEF.exe 9->14         started        17 RdrCEF.exe 9->17         started        process6 dnsIp7 21 80.0.0.0 NTLGB United Kingdom 14->21
Threat name:
Win32.Trojan.IcedID
Status:
Malicious
First seen:
2020-09-23 23:52:08 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments