MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4438467f45eedf09a6ddf01129a914bd3846bc7771bc15bfb512b85337b5d108. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
IcedID
Vendor detections: 8
| SHA256 hash: | 4438467f45eedf09a6ddf01129a914bd3846bc7771bc15bfb512b85337b5d108 |
|---|---|
| SHA3-384 hash: | 57438330d68a8633cde7faf9e11db25e6e76165184295c369183a93ac36874988ba735095a452e2bbc5edaa61996d013 |
| SHA1 hash: | 5f11f480c80f7b9618e4749aba7ba702e99084f2 |
| MD5 hash: | f06d2771c4da08f995212ac4121d4049 |
| humanhash: | east-princess-spring-blossom |
| File name: | Feleukoc.exe |
| Download: | download sample |
| Signature | IcedID |
| File size: | 355'328 bytes |
| First seen: | 2020-07-17 14:23:02 UTC |
| Last seen: | 2020-07-17 15:11:48 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 19d8c1578757a576cd980da065fd6f38 (1 x IcedID) |
| ssdeep | 6144:fWgmIhvqcAG/3mWEKcrxmILmpQoj0KLS:ulG/3mWEfxmwNuLS |
| Threatray | 2'818 similar samples on MalwareBazaar |
| TLSH | 8174A25EA7BC53A3CF72AAB0440D6E6133F47910E6B13D83F54A2D1B6D28ED2C258B54 |
| Reporter | |
| Tags: | IcedID |
Intelligence
File Origin
# of uploads :
2
# of downloads :
102
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
80 / 100
Signature
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Behaviour
Behavior Graph:
Detection:
icedid
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-07-17 14:24:06 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
gozi
icedid
Similar samples:
+ 2'808 additional samples on MalwareBazaar
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Unknown
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Delivery method
Distributed via drive-by
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.