MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4438467f45eedf09a6ddf01129a914bd3846bc7771bc15bfb512b85337b5d108. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 4438467f45eedf09a6ddf01129a914bd3846bc7771bc15bfb512b85337b5d108
SHA3-384 hash: 57438330d68a8633cde7faf9e11db25e6e76165184295c369183a93ac36874988ba735095a452e2bbc5edaa61996d013
SHA1 hash: 5f11f480c80f7b9618e4749aba7ba702e99084f2
MD5 hash: f06d2771c4da08f995212ac4121d4049
humanhash: east-princess-spring-blossom
File name:Feleukoc.exe
Download: download sample
Signature IcedID
File size:355'328 bytes
First seen:2020-07-17 14:23:02 UTC
Last seen:2020-07-17 15:11:48 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 19d8c1578757a576cd980da065fd6f38 (1 x IcedID)
ssdeep 6144:fWgmIhvqcAG/3mWEKcrxmILmpQoj0KLS:ulG/3mWEfxmwNuLS
Threatray 2'818 similar samples on MalwareBazaar
TLSH 8174A25EA7BC53A3CF72AAB0440D6E6133F47910E6B13D83F54A2D1B6D28ED2C258B54
Reporter TrappmanRhett
Tags:IcedID

Intelligence


File Origin
# of uploads :
2
# of downloads :
102
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
80 / 100
Signature
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-07-17 14:24:06 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via drive-by

Comments