MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 283e5d0fe79022c059764ae982a27191962d0463b430ed278c0b61fac73bba9f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 283e5d0fe79022c059764ae982a27191962d0463b430ed278c0b61fac73bba9f
SHA3-384 hash: c3482bfcb4c0355d5cfb931cd4c3dd8f92af2bb1e31aa4bdd66bd44aea5982c8007ffd0c623e128606ebb07c62e8de9c
SHA1 hash: 31d081cb92aa9f50ffa1057edf2565098e6efcf5
MD5 hash: cb152a834589cc46dc89a0b346cea1ff
humanhash: speaker-four-montana-sierra
File name:ZmAqT.pdf
Download: download sample
Signature IcedID
File size:293'890 bytes
First seen:2020-10-07 21:15:37 UTC
Last seen:2020-10-07 21:57:35 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 6c4861b61e73e158254766955c036e4f (10 x IcedID)
ssdeep 6144:vj2ezOktWfCNv9cvA7Zguu3pJ5BrKa45wz7AOy+LM43CIMc:vHqkUfCNvyI3u3p5A5w7g+L5n
Threatray 19 similar samples on MalwareBazaar
TLSH 8F548D11FD82C072E4B206350874ABB147BDB9211FA4CFE763D4196E8E765C0AB36DB6
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
2
# of downloads :
161
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending a custom TCP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Antivirus / Scanner detection for submitted sample
Initial sample is a PE file and has a suspicious name
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 294791 Sample: ZmAqT.pdf Startdate: 07/10/2020 Architecture: WINDOWS Score: 52 20 cdn.onenote.net 2->20 26 Antivirus / Scanner detection for submitted sample 2->26 28 Initial sample is a PE file and has a suspicious name 2->28 8 AcroRd32.exe 37 2->8         started        signatures3 process4 process5 10 RdrCEF.exe 45 8->10         started        13 AcroRd32.exe 2 5 8->13         started        dnsIp6 22 192.168.2.1 unknown unknown 10->22 15 RdrCEF.exe 10->15         started        18 RdrCEF.exe 10->18         started        process7 dnsIp8 24 80.0.0.0 NTLGB United Kingdom 15->24
Threat name:
Win32.Trojan.IcedID
Status:
Malicious
First seen:
2020-10-07 21:17:08 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Blacklisted process makes network request
Unpacked files
SH256 hash:
cb2a666ad7487eba2a388d41f2b2e47de9da27e7db4f358a2dd5bde5c56a943b
MD5 hash:
8b521465a6a8232677db696f7e0f6cac
SHA1 hash:
89db45205ebc253805bfb3131889360308d09331
SH256 hash:
283e5d0fe79022c059764ae982a27191962d0463b430ed278c0b61fac73bba9f
MD5 hash:
cb152a834589cc46dc89a0b346cea1ff
SHA1 hash:
31d081cb92aa9f50ffa1057edf2565098e6efcf5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments