MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 26814ac4a62e9a9a3fe1059ba49709b161085cc3a1cbbdf5ee20beb742908083. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 26814ac4a62e9a9a3fe1059ba49709b161085cc3a1cbbdf5ee20beb742908083
SHA3-384 hash: 7a72b19a51637fba8e9b3e87e5eae0ae3422a759a530bc61b2cdece91cbefcc24150f3c807cb398e940c720ada0fa4fa
SHA1 hash: 37f8ca18b99e268d4089938439d52146484b5818
MD5 hash: 661cf8533441ebcfb366394335462679
humanhash: october-snake-steak-black
File name:main.theme
Download: download sample
Signature IcedID
File size:176'130 bytes
First seen:2020-07-30 17:18:59 UTC
Last seen:2020-07-30 18:01:36 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 4aa163fad232bda6f6345e56c47550eb (22 x IcedID, 4 x Gozi)
ssdeep 3072:6KBPXLIOI4Bg6YJdC1ZxZgpARBk+ltNuVH4:6wPCJA8sB3tgY
Threatray 435 similar samples on MalwareBazaar
TLSH 4A047C123690C072D6AA0B3D0473CB5173FBB5A1CF74A5C3BB952A8E5E627D09E39346
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
2
# of downloads :
117
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Result
Threat name:
Unknown
Detection:
clean
Classification:
n/a
Score:
0 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-07-30 17:20:08 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Modifies system certificate store
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments