MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 691484e4df83d6f592a0ddebd8bd1afffc4568205a3b7f51c11c549124a1150c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 691484e4df83d6f592a0ddebd8bd1afffc4568205a3b7f51c11c549124a1150c
SHA3-384 hash: 7ed7c6c5e55bbd1235efeccf17ddb0688df3f0ce08279a5645bf38a8b7b51181c9174c7fbb6aac08db65feb8cde8a22e
SHA1 hash: 0d1ce016532a16e2b302e2c733d2a941da14a712
MD5 hash: dea63acee01756034d57ed180d30d55b
humanhash: illinois-mars-sad-mars
File name:giigtb.exe
Download: download sample
Signature IcedID
File size:144'384 bytes
First seen:2020-09-11 19:43:59 UTC
Last seen:2020-09-11 20:43:42 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2987c11657f01e3ac0640de00fb0c916 (2 x IcedID)
ssdeep 3072:VQUUHksew+bArSrW4h+ZtBSrSe/CfkB90vJF:vUEU+5rH/rSe/2kYRF
Threatray 574 similar samples on MalwareBazaar
TLSH F3E39D2175E18472E1BF46320870DB06076EBDA24B708DAB7BD8560EDE359D14E36BE3
Reporter malware_traffic
Tags:exe IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
2
# of downloads :
205
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending a custom TCP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Contains VNC / remote desktop functionality (version string found)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Early bird code injection technique detected
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.WannaCry
Status:
Malicious
First seen:
2020-09-11 19:45:06 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:crime_win32_banker_iceid_ldr1
Author:@VK_Intel
Description:Detects IcedId/BokBot png loader (unpacked)
Reference:twitter

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments