MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 56c26ed446ff536e676969a770d3ca72bd5bb1faf20aa64ecb559cbaab4d36d2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 56c26ed446ff536e676969a770d3ca72bd5bb1faf20aa64ecb559cbaab4d36d2
SHA3-384 hash: d27f50fb394ba24f1e0ce083b816efdcc7abd0dd50983190838093822f59652fae7e09ad07d6dd7e1e7efb45d471b73a
SHA1 hash: 9d1a20b84fe8cf0a3afbecdbe8a4d0b9a6b761e8
MD5 hash: 331976fe1dca57b408fd0150c662e096
humanhash: oxygen-tennessee-rugby-robert
File name:Donorcasino.dat
Download: download sample
Signature IcedID
File size:287'440 bytes
First seen:2020-11-30 18:38:35 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 307361dd86ec27ba4aec118d1cf145c9 (2 x IcedID)
ssdeep 6144:E+J6EWI9FatwUCLTlNy03xW3kLi7GfQpCVf2UAW:t6PeFatCLTlNy0hji7mZ92rW
Threatray 18 similar samples on MalwareBazaar
TLSH A8548D22E3954470F27B0A315077D1638BBDBA508BB48DD7639A202D3DA37F1A934B5E
Reporter malware_traffic
Tags:dll IcedID Shathak TA551


Avatar
malware_traffic
Run method: regsvr32.exe /s [filename]

Intelligence


File Origin
# of uploads :
1
# of downloads :
316
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
DNS request
Sending a custom TCP request
Connection attempt
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
60 / 100
Signature
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Contains VNC / remote desktop functionality (version string found)
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.GenCBL
Status:
Malicious
First seen:
2020-11-30 18:39:06 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:icedid banker trojan
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
IcedID Core Payload
ServiceHost packer
IcedID, BokBot
Unpacked files
SH256 hash:
46cabc878a2aace8fe26594ecde18b5789a71ea43ce3fd518676cfae02a8936b
MD5 hash:
544665ceee8c5acba2e1209b340dad43
SHA1 hash:
3b86689116125d990073d572dd7dbd114f0269cf
SH256 hash:
56c26ed446ff536e676969a770d3ca72bd5bb1faf20aa64ecb559cbaab4d36d2
MD5 hash:
331976fe1dca57b408fd0150c662e096
SHA1 hash:
9d1a20b84fe8cf0a3afbecdbe8a4d0b9a6b761e8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:crime_win32_banker_iceid_ldr1
Author:@VK_Intel
Description:Detects IcedId/BokBot png loader (unpacked)
Reference:twitter

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments