MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 681217e6c8ed3ed37c1312646afb8e0cfe25e6840f461d10a7d9cdd4ffa725cb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 681217e6c8ed3ed37c1312646afb8e0cfe25e6840f461d10a7d9cdd4ffa725cb
SHA3-384 hash: 6acaf83d10c23ecaf74cc9c468285006eb31f841f43454d1aacb4a1703ee447567cd25ee6376c4c63d8a002a6b5ed1bc
SHA1 hash: 96f5d75af40b30738c06f78dfb1dd09c485ac513
MD5 hash: 6b8d028370567e717055e49101d460fa
humanhash: fifteen-artist-yellow-speaker
File name:O p e n.bat
Download: download sample
Signature IcedID
File size:1'679 bytes
First seen:2023-02-21 21:59:21 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/plain
ssdeep 48:546vsqjkfhlzextB9xrjRauBwBvo6Bf6Nee85nJJy5+l5nJJxB:7vzoLYBLj/T2ee1nJJrnJJf
Threatray 1'391 similar samples on MalwareBazaar
TLSH T1DA31CE3F083E9A36B1B7A0EB9B5A3AD15BCDC7B21748EE9C4E010D853F240E50246D05
Reporter pr0xylife
Tags:bat IcedID

Intelligence


File Origin
# of uploads :
1
# of downloads :
164
Origin country :
RU RU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Contract_02_21_Copy#909.one
Verdict:
No threats detected
Analysis date:
2023-02-21 22:00:34 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
75%
Tags:
packed
Result
Verdict:
MALICIOUS
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
76 / 100
Signature
Powershell drops PE file
Sigma detected: Execute DLL with spoofed extension
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected IcedID
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-02-21 22:00:08 UTC
File Type:
Text (Batch)
AV detection:
3 of 39 (7.69%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:icedid campaign:3329953471 banker loader trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Loads dropped DLL
Blocklisted process makes network request
Downloads MZ/PE file
IcedID, BokBot
Malware Config
C2 Extraction:
aerilaponawki.com
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments