MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2ea61a28711cd9ac50e849c85c041faf5799e306beedaf0444df3a00a4aa0ea6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 2ea61a28711cd9ac50e849c85c041faf5799e306beedaf0444df3a00a4aa0ea6
SHA3-384 hash: e8d08602d145bf1e62f08b70a2d3186cecee227a85a73a3f070d173f9d9362ca865b233abbe418f90fc1bd59f0c9ac7d
SHA1 hash: e13dca371bbc831122299edf35f549372740dc3c
MD5 hash: d20786bb2c1147adc9695c0049fa448c
humanhash: ohio-speaker-stairway-april
File name:2020-07-14-DLL-for-IcedID-installer-example-09-of-18.bin
Download: download sample
Signature IcedID
File size:162'816 bytes
First seen:2020-07-15 08:20:06 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash e8fbd6da0d38f3c7dc051ba3209cd26f (17 x IcedID)
ssdeep 3072:jByDMAeNBnKlc5Sh2Y0ylyCAK0u3q33U3A3ymr+rvo:jBS6BKlU2T0PKI3k3An+rvo
Threatray 784 similar samples on MalwareBazaar
TLSH C8F38B05BA40C071D5BE1D384931D7AA0B7D7C30EFD19A8B77C42A6E1EB12D0AD35EA6
Reporter JAMESWT_WT
Tags:dll IcedID IceID

Intelligence


File Origin
# of uploads :
1
# of downloads :
111
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Sending a custom TCP request
Threat name:
Win32.Trojan.IcedID
Status:
Malicious
First seen:
2020-07-15 02:55:29 UTC
File Type:
PE (Dll)
Extracted files:
26
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Modifies system certificate store
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments