MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 41882804f7c0408c2bb901518b6b5434de7926e809ba571728e459229238024b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments 1

SHA256 hash: 41882804f7c0408c2bb901518b6b5434de7926e809ba571728e459229238024b
SHA3-384 hash: 0f4e666ef7b030b25159c3afbbaf63fe33d8120bdf9d91aff63bff4f89fd8f3ff482073b5dead6eba34043f51f7088e8
SHA1 hash: 1599060f89efd5934e53dd076706281b11284eb6
MD5 hash: f9cc5c549aeedac5ed6c1bdaf5430ee4
humanhash: california-fanta-nevada-glucose
File name:f9cc5c549aeedac5ed6c1bdaf5430ee4
Download: download sample
Signature IcedID
File size:181'248 bytes
First seen:2022-01-30 00:43:38 UTC
Last seen:2022-01-30 02:41:01 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 616c436c7831fb3dbff4f23b2e172057 (2 x IcedID)
ssdeep 3072:J1OW6VPRcGwdUS53LxizqJx24/x6MfFmx:jaVTwbRLcWJno
Threatray 152 similar samples on MalwareBazaar
TLSH T120049F0722EC7CDAD4318270A7738BC5D72EFC240661DA6E16C052565E7F392BE66BE0
File icon (PE):PE icon
dhash icon 6edbb12b17172b96 (10 x Quakbot, 9 x Heodo, 7 x BazaLoader)
Reporter zbetcheckin
Tags:exe IcedID

Intelligence


File Origin
# of uploads :
2
# of downloads :
334
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
f9cc5c549aeedac5ed6c1bdaf5430ee4
Verdict:
No threats detected
Analysis date:
2022-01-30 00:45:52 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
DNS request
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
MeasuringTime
CheckCmdLine
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware icedid
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Regsvr32 Network Activity
Sigma detected: Suspicious Call by Ordinal
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected IcedID
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 562744 Sample: iXcAbfbqEt Startdate: 30/01/2022 Architecture: WINDOWS Score: 100 55 Found malware configuration 2->55 57 Multi AV Scanner detection for submitted file 2->57 59 Yara detected IcedID 2->59 61 3 other signatures 2->61 7 loaddll64.exe 1 2->7         started        process3 dnsIp4 49 cleverballs.com 7->49 51 tp.8e49140c2-frontier.amazon.com 7->51 53 2 other IPs or domains 7->53 69 Contains functionality to detect hardware virtualization (CPUID execution measurement) 7->69 71 Tries to detect virtualization through RDTSC time measurements 7->71 11 cmd.exe 1 7->11         started        13 regsvr32.exe 7->13         started        16 rundll32.exe 7->16         started        19 2 other processes 7->19 signatures5 process6 dnsIp7 21 rundll32.exe 11->21         started        73 Contains functionality to detect hardware virtualization (CPUID execution measurement) 13->73 75 Tries to detect virtualization through RDTSC time measurements 13->75 25 regsvr32.exe 13->25         started        27 cleverballs.com 16->27 29 tp.8e49140c2-frontier.amazon.com 16->29 35 2 other IPs or domains 16->35 77 System process connects to network (likely due to code injection or exploit) 16->77 31 cleverballs.com 19->31 33 cleverballs.com 19->33 37 6 other IPs or domains 19->37 signatures8 process9 dnsIp10 39 cleverballs.com 103.208.86.20, 49749, 49750, 49751 ZAPPIE-HOST-ASZappieHostGB New Zealand 21->39 41 dr49lng3n1n2s.cloudfront.net 52.85.119.73, 443, 49746, 49747 AMAZON-02US United States 21->41 47 2 other IPs or domains 21->47 63 System process connects to network (likely due to code injection or exploit) 21->63 65 Contains functionality to detect hardware virtualization (CPUID execution measurement) 21->65 67 Tries to detect virtualization through RDTSC time measurements 21->67 43 tp.8e49140c2-frontier.amazon.com 25->43 45 aws.amazon.com 25->45 signatures11
Threat name:
Win64.Trojan.BazarLoader
Status:
Malicious
First seen:
2022-01-28 15:46:17 UTC
File Type:
PE+ (Dll)
Extracted files:
17
AV detection:
15 of 28 (53.57%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
41882804f7c0408c2bb901518b6b5434de7926e809ba571728e459229238024b
MD5 hash:
f9cc5c549aeedac5ed6c1bdaf5430ee4
SHA1 hash:
1599060f89efd5934e53dd076706281b11284eb6
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

IcedID

Executable exe 41882804f7c0408c2bb901518b6b5434de7926e809ba571728e459229238024b

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-01-30 00:43:40 UTC

url : hxxp://asoperdo.com/alt1/3.dll