MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2329018641118f8138f32a49b862312cb416c939854bb8fc953e08a5e25ced1d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 2329018641118f8138f32a49b862312cb416c939854bb8fc953e08a5e25ced1d
SHA3-384 hash: 191786b2b61383eff2591c7a9874d178d79ea22ca23c5cfdde4a146e51602c8a980ce3f629ae24133d698f24559f1849
SHA1 hash: 80e00b8cde0686412c3c3cc215b806b20ea153bc
MD5 hash: 284b03154b7b511425342a0abae35388
humanhash: stairway-kansas-table-fix
File name:80e00b8cde0686412c3c3cc215b806b20ea153bc.dll
Download: download sample
Signature IcedID
File size:1'163'776 bytes
First seen:2021-12-07 23:20:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d61fa58dc9fb530f6808a80c6e710152 (1 x IcedID, 1 x BazaLoader)
ssdeep 24576:jTFXogxhWMBCurAhzoyyr3gvp4A34j+ic4exs6Yn9BA9G:v2gMMRXjA9
Threatray 87 similar samples on MalwareBazaar
TLSH T1A8359D1A725502B9D077D03CC9874B52E6B174068330ABDB17E06BAE2F277E25A7FB11
Reporter Anonymous
Tags:exe IcedID

Intelligence


File Origin
# of uploads :
1
# of downloads :
240
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
80e00b8cde0686412c3c3cc215b806b20ea153bc.dll
Verdict:
No threats detected
Analysis date:
2021-12-07 23:22:00 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Result
Malware family:
n/a
Score:
  0/10
Tags:
n/a
Behaviour
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Found malware configuration
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected IcedID
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 535994 Sample: XeIVEjpp8a.dll Startdate: 08/12/2021 Architecture: WINDOWS Score: 84 59 Found malware configuration 2->59 61 Yara detected IcedID 2->61 63 C2 URLs / IPs found in malware configuration 2->63 7 loaddll64.exe 1 2->7         started        process3 dnsIp4 39 houghthepl.ink 7->39 41 192.168.2.1 unknown unknown 7->41 43 3 other IPs or domains 7->43 71 Contains functionality to detect hardware virtualization (CPUID execution measurement) 7->71 73 Tries to detect virtualization through RDTSC time measurements 7->73 11 cmd.exe 1 7->11         started        13 regsvr32.exe 7->13         started        17 rundll32.exe 7->17         started        19 3 other processes 7->19 signatures5 process6 dnsIp7 21 rundll32.exe 11->21         started        45 houghthepl.ink 68.183.204.114, 49832, 49846, 49847 DIGITALOCEAN-ASNUS United States 13->45 47 dr49lng3n1n2s.cloudfront.net 13.224.92.74, 443, 49831, 49833 AMAZON-02US United States 13->47 53 2 other IPs or domains 13->53 75 Contains functionality to detect hardware virtualization (CPUID execution measurement) 13->75 77 Tries to detect virtualization through RDTSC time measurements 13->77 55 2 other IPs or domains 17->55 79 System process connects to network (likely due to code injection or exploit) 17->79 49 tp.8e49140c2-frontier.amazon.com 19->49 51 tp.8e49140c2-frontier.amazon.com 19->51 57 2 other IPs or domains 19->57 25 iexplore.exe 134 19->25         started        signatures8 process9 dnsIp10 27 houghthepl.ink 21->27 29 tp.8e49140c2-frontier.amazon.com 21->29 35 2 other IPs or domains 21->35 65 System process connects to network (likely due to code injection or exploit) 21->65 67 Contains functionality to detect hardware virtualization (CPUID execution measurement) 21->67 69 Tries to detect virtualization through RDTSC time measurements 21->69 31 lg3.media.net 23.211.6.95, 443, 49799, 49800 AKAMAI-ASUS United States 25->31 33 www.msn.com 25->33 37 3 other IPs or domains 25->37 signatures11
Threat name:
Win64.Trojan.Sabsik
Status:
Suspicious
First seen:
2021-12-07 23:21:09 UTC
File Type:
PE+ (Dll)
Extracted files:
1
AV detection:
19 of 28 (67.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:icedid campaign:511873508 banker trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
IcedID, BokBot
Malware Config
C2 Extraction:
houghthepl.ink
Unpacked files
SH256 hash:
2329018641118f8138f32a49b862312cb416c939854bb8fc953e08a5e25ced1d
MD5 hash:
284b03154b7b511425342a0abae35388
SHA1 hash:
80e00b8cde0686412c3c3cc215b806b20ea153bc
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments