MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 58215823021c2da84fcf725bbb9b118aba9b72178577cba1d4c69545b9ae7fa2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 58215823021c2da84fcf725bbb9b118aba9b72178577cba1d4c69545b9ae7fa2
SHA3-384 hash: 02a40b958d3dae2499a531ce1b674cad45a87e742072853b34c2d36e60c2432e7daa7b3eede736a41a0d928ce8cd7abe
SHA1 hash: d1eb193ea31672197e00fb18bab1af719e6b0652
MD5 hash: 9cd6fd8a97096da267c0b51a2e5c2982
humanhash: network-batman-tennis-arizona
File name:qoadaa.exe
Download: download sample
Signature IcedID
File size:344'064 bytes
First seen:2020-07-23 17:27:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 8a586d43b2772dedfa9f96507045825b (2 x IcedID)
ssdeep 6144:vtkBEU0ttaUdT+dsw8wm6OHzZjyvss237R:TUmta5W6OHVjyvs
Threatray 2'806 similar samples on MalwareBazaar
TLSH FF748D23B281D032DDAA42754D1ECA74572A7C2157230ADF67C07BEE0F25AD3693E786
Reporter malware_traffic
Tags:exe IcedID

Intelligence


File Origin
# of uploads :
1
# of downloads :
111
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spre.troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 250530 Sample: qoadaa.exe Startdate: 24/07/2020 Architecture: WINDOWS Score: 100 60 Multi AV Scanner detection for submitted file 2->60 62 Contains VNC / remote desktop functionality (version string found) 2->62 64 Uses net.exe to modify the status of services 2->64 66 2 other signatures 2->66 8 qoadaa.exe 2 2->8         started        process3 dnsIp4 46 iskuliokilo.pw 194.5.249.122, 443, 49715, 49717 NXTHOST-64398NXTHOSTCOM-NXTSERVERSSRLRO Romania 8->46 48 passiopersio.top 8->48 68 Detected unpacking (changes PE section rights) 8->68 70 Detected unpacking (overwrites its own PE header) 8->70 72 Early bird code injection technique detected 8->72 74 5 other signatures 8->74 12 msiexec.exe 1 3 8->12         started        signatures5 process6 dnsIp7 50 passiopersio.top 12->50 52 iskuliokilo.pw 12->52 54 betafrosner.best 12->54 44 C:\Users\user\AppData\Local\...\sqlite64.dll, PE32+ 12->44 dropped 76 Tries to steal Mail credentials (via file access) 12->76 78 Contains functionality to detect hardware virtualization (CPUID execution measurement) 12->78 80 Tries to harvest and steal browser information (history, passwords, etc) 12->80 82 2 other signatures 12->82 17 systeminfo.exe 1 1 12->17         started        20 cmd.exe 1 12->20         started        22 net.exe 1 12->22         started        24 6 other processes 12->24 file8 signatures9 process10 signatures11 56 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 17->56 58 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 17->58 26 conhost.exe 17->26         started        28 conhost.exe 20->28         started        30 chcp.com 1 20->30         started        32 conhost.exe 22->32         started        34 net1.exe 1 22->34         started        36 conhost.exe 24->36         started        38 conhost.exe 24->38         started        40 conhost.exe 24->40         started        42 3 other processes 24->42 process12
Threat name:
Win32.Trojan.IcedID
Status:
Malicious
First seen:
2020-07-23 17:29:05 UTC
AV detection:
19 of 29 (65.52%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Modifies registry class
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Modifies registry class
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments