MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IceXLoader


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: 6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794
SHA3-384 hash: 7e222db2a6d86533adb859b62509e34ab97f9c01747de3df0e545f7f974d705c71fb25ccbf174721dab42b97e631207e
SHA1 hash: 4e9d843f432c27434898864258d53787c7b207f9
MD5 hash: 0075306f5fda6d70684ecd0f29a61f2e
humanhash: gee-artist-maine-jersey
File name:6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.bin
Download: download sample
Signature IceXLoader
File size:356'745 bytes
First seen:2022-06-20 17:54:19 UTC
Last seen:2022-06-20 18:43:30 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ddb8da8ce9f6d7c99471e82a46c98901 (11 x IceXLoader)
ssdeep 6144:3hf/YQnRZNwMYORbNB9l2fx3RfyVQhAyPlo/2:3hBPKMt12fTfyVQhAyPlo/2
TLSH T151744B45EB918CBAC921633B89D7D277623CBAF44363DB476E251934EA132E15FC9302
TrID 33.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
21.3% (.EXE) Win64 Executable (generic) (10523/12/4)
13.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.1% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter Arkbird_SOLG
Tags:exe IceXLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
331
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %AppData% directory
Running batch commands
Launching a process
Creating a process from a recently created file
Creating a file in the %temp% directory
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm evasive overlay spyeye
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
IceXLoader
Detection:
malicious
Classification:
troj.adwa.evad
Score:
76 / 100
Signature
Adds a directory exclusion to Windows Defender
Disables Windows Defender (via service or powershell)
Drops PE files to the startup folder
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected IceXLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 649061 Sample: WTIwNMJTrA.bin Startdate: 20/06/2022 Architecture: WINDOWS Score: 76 69 r4yza92.com 2->69 83 Multi AV Scanner detection for dropped file 2->83 85 Multi AV Scanner detection for submitted file 2->85 87 Yara detected IceXLoader 2->87 10 WTIwNMJTrA.exe 2 5 2->10         started        14 EGe.exe 2->14         started        17 EGe.exe 2->17         started        19 2 other processes 2->19 signatures3 process4 dnsIp5 65 C:\Users\user\AppData\Roaming\...Ge.exe, PE32 10->65 dropped 67 C:\Users\user\AppData\RoamingGe.exe, PE32 10->67 dropped 99 Drops PE files to the startup folder 10->99 21 cmd.exe 1 10->21         started        24 cmd.exe 1 10->24         started        75 r4yza92.com 14->75 26 cmd.exe 1 14->26         started        77 r4yza92.com 17->77 28 cmd.exe 17->28         started        79 r4yza92.com 19->79 81 r4yza92.com 19->81 30 cmd.exe 19->30         started        32 cmd.exe 19->32         started        file6 signatures7 process8 signatures9 91 Adds a directory exclusion to Windows Defender 21->91 93 Disables Windows Defender (via service or powershell) 21->93 34 EGe.exe 1 21->34         started        38 conhost.exe 21->38         started        40 timeout.exe 1 21->40         started        42 conhost.exe 24->42         started        44 timeout.exe 1 24->44         started        46 4 other processes 26->46 48 4 other processes 28->48 50 4 other processes 30->50 52 4 other processes 32->52 process10 dnsIp11 71 r4yza92.com 5.181.80.10, 443, 49758, 49759 TELEHOUSE-ASBG Bulgaria 34->71 73 192.168.2.1 unknown unknown 34->73 89 Multi AV Scanner detection for dropped file 34->89 54 cmd.exe 1 34->54         started        signatures12 process13 signatures14 95 Adds a directory exclusion to Windows Defender 54->95 97 Disables Windows Defender (via service or powershell) 54->97 57 powershell.exe 25 54->57         started        59 conhost.exe 54->59         started        61 powershell.exe 54->61         started        63 powershell.exe 54->63         started        process15
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2022-06-09 14:21:37 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
23 of 26 (88.46%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Adds Run key to start application
Deletes itself
Drops startup file
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794
MD5 hash:
0075306f5fda6d70684ecd0f29a61f2e
SHA1 hash:
4e9d843f432c27434898864258d53787c7b207f9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:exploit_any_poppopret
Author:Jeff White [karttoon@gmail.com] @noottrak
Description:Identify POP -> POP -> RET opcodes for quick ROP Gadget creation in target binaries.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments