MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 32653980c15ef2c4a6b12411b5b9e2d2db7bbfb28a3595bbf707df2a9d7b84b3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 32653980c15ef2c4a6b12411b5b9e2d2db7bbfb28a3595bbf707df2a9d7b84b3
SHA3-384 hash: 79561e072b3ea64c53fc49564ed9bfbff5af6e1fd4f0f8c07bd49537580585c02996db3fcfdba9361ea583886260506f
SHA1 hash: e959b0d6270c4f77c36c270f60c81becf0cbb6b3
MD5 hash: a4e11d62ba0e175774dd58f7f3b6deb9
humanhash: five-california-eighteen-steak
File name:temp.tmp
Download: download sample
Signature IcedID
File size:353'280 bytes
First seen:2020-09-10 15:54:22 UTC
Last seen:2020-09-10 16:53:37 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 4c09112beedb251f9c3e94ee000e2521 (2 x IcedID)
ssdeep 6144:utagjRxE/9yNAE3IDSDuL2v4tDtZwF3ZyNEuE/FNzI8DfDN1AS:unjRq/9y02vkcFwNEuE/FN0E
TLSH C6741901B7A08034F5BB0AF965BE61A8593D7DE12B24C0DB67D42ADE4A35BE4EC30717
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
2
# of downloads :
149
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending a custom TCP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
A
b
c
d
e
f
i
l
M
n
o
r
S
t
u
V
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.IcedID
Status:
Malicious
First seen:
2020-09-10 15:56:06 UTC
File Type:
PE (Dll)
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments