MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4786bab974f899355634be167aa2c689923ab38b00cdd71f678b988c09cd6414. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 8


Intelligence 8 IOCs 1 YARA 5 File information Comments

SHA256 hash: 4786bab974f899355634be167aa2c689923ab38b00cdd71f678b988c09cd6414
SHA3-384 hash: c7a3c1ad348125c3f3fa0de38e599303bb29d605abe2f87697e6ec770c43c7039fddaed73e6a6a5741fbe4839de21a51
SHA1 hash: 91cc57703a1d8d0b9c9c3aa80d06d186a53230a7
MD5 hash: 6424dcd52f8329de1d4ae5f9329e78a2
humanhash: twelve-high-muppet-four
File name:4786bab974f899355634be167aa2c689923ab38b00cdd.dll
Download: download sample
Signature IcedID
File size:137'728 bytes
First seen:2021-11-30 06:27:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3b4014f1ffd5245ea948c717c78d1d57 (13 x IcedID)
ssdeep 3072:782IYT+0TqlpdN0L0Va7zw8yvSy8/Q5NU1EnpXTkVuiSMLGK0E8Lt:7Aq9mlpdOL0E7zwuGK0Egt
Threatray 54 similar samples on MalwareBazaar
TLSH T114D36B6F95A8C543EDA94CB8DEDA61C7C5E3B73D8D3A92F71D50A4203D294A09E4E303
Reporter abuse_ch
Tags:dll exe IcedID


Avatar
abuse_ch
IcedID C2:
mchinamoz.com

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
mchinamoz.com https://threatfox.abuse.ch/ioc/256298/

Intelligence


File Origin
# of uploads :
1
# of downloads :
216
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
4786bab974f899355634be167aa2c689923ab38b00cdd.dll
Verdict:
No threats detected
Analysis date:
2021-11-30 07:42:00 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a file in the Windows subdirectories
DNS request
Sending a custom TCP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Found malware configuration
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected IcedID
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 530898 Sample: 4786bab974f899355634be167aa... Startdate: 30/11/2021 Architecture: WINDOWS Score: 92 28 www.msn.com 2->28 30 srtb.msn.com 2->30 64 Found malware configuration 2->64 66 Multi AV Scanner detection for submitted file 2->66 68 Yara detected IcedID 2->68 70 C2 URLs / IPs found in malware configuration 2->70 8 loaddll64.exe 1 2->8         started        signatures3 process4 dnsIp5 44 mchinamoz.com 8->44 46 tp.8e49140c2-frontier.amazon.com 8->46 48 2 other IPs or domains 8->48 78 Contains functionality to detect hardware virtualization (CPUID execution measurement) 8->78 80 Tries to detect virtualization through RDTSC time measurements 8->80 12 cmd.exe 1 8->12         started        14 regsvr32.exe 8->14         started        18 rundll32.exe 8->18         started        20 3 other processes 8->20 signatures6 process7 dnsIp8 22 rundll32.exe 12->22         started        50 mchinamoz.com 14->50 58 3 other IPs or domains 14->58 82 Contains functionality to detect hardware virtualization (CPUID execution measurement) 14->82 84 Tries to detect virtualization through RDTSC time measurements 14->84 52 mchinamoz.com 18->52 60 3 other IPs or domains 18->60 86 System process connects to network (likely due to code injection or exploit) 18->86 54 mchinamoz.com 20->54 56 mchinamoz.com 20->56 62 4 other IPs or domains 20->62 26 iexplore.exe 148 20->26         started        signatures9 process10 dnsIp11 32 mchinamoz.com 168.100.8.136, 49878, 49879, 49881 CLOUD9US United States 22->32 34 tp.8e49140c2-frontier.amazon.com 22->34 40 2 other IPs or domains 22->40 72 System process connects to network (likely due to code injection or exploit) 22->72 74 Contains functionality to detect hardware virtualization (CPUID execution measurement) 22->74 76 Tries to detect virtualization through RDTSC time measurements 22->76 36 www.msn.com 26->36 38 web.vortex.data.msn.com 26->38 42 4 other IPs or domains 26->42 signatures12
Threat name:
Win64.Trojan.KryptikAGen
Status:
Malicious
First seen:
2021-11-30 06:28:11 UTC
File Type:
PE+ (Sys)
AV detection:
18 of 28 (64.29%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:icedid campaign:3858400908 banker trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
IcedID, BokBot
Malware Config
C2 Extraction:
mchinamoz.com
Unpacked files
SH256 hash:
4786bab974f899355634be167aa2c689923ab38b00cdd71f678b988c09cd6414
MD5 hash:
6424dcd52f8329de1d4ae5f9329e78a2
SHA1 hash:
91cc57703a1d8d0b9c9c3aa80d06d186a53230a7
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:crime_win32_icedid_stage1
Author:Rony (@r0ny_123)
Description:Detects IcedID Photoloader
Reference:https://sysopfb.github.io/malware,/icedid/2020/04/28/IcedIDs-updated-photoloader.html
Rule name:IcedID_init_loader
Author:@bartblaze
Description:Identifies IcedID (stage 1 and 2, initial loaders).
Rule name:MALWARE_Win_IceID
Author:ditekSHen
Description:Detects IceID / Bokbot variants
Rule name:MAL_IcedID_GZIP_LDR_202104
Author:Thomas Barabosch, Telekom Security
Description:2021 initial Bokbot / Icedid loader for fake GZIP payloads
Reference:https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Rule name:win_iceid_gzip_ldr_202104
Author:Thomas Barabosch, Telekom Security
Description:2021 initial Bokbot / Icedid loader for fake GZIP payloads

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

IcedID

Executable exe 4786bab974f899355634be167aa2c689923ab38b00cdd71f678b988c09cd6414

(this sample)

  
Delivery method
Distributed via web download

Comments