MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 705e14735da74b107357a676c15b07c0f0c86888b8f98ba86e1029ff4e4858df. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 705e14735da74b107357a676c15b07c0f0c86888b8f98ba86e1029ff4e4858df
SHA3-384 hash: a6fb752a3eaa03c887eb07935b75910eeb47faab2b87a6a8a9cccc3c48f5ff99984f9d98542993d6e0dc0afa79e73393
SHA1 hash: 8c1977305284f6ef719d6e92f0e90f069476a62a
MD5 hash: 5d7ce2398942eb03bd0065aea3d5da15
humanhash: uranus-oven-robert-cold
File name:e325b.pdf
Download: download sample
Signature IcedID
File size:415'746 bytes
First seen:2020-09-21 18:26:57 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash c6999771217f1216d96e792ac4717a66 (4 x IcedID)
ssdeep 6144:MU/OLpMfiR6vtVIgyPFiChgkX7WOMeLpebnZgUe4A29pNwzg:MU/OLCf1LqPACIeoFa4A29Dwzg
TLSH 10943A11B7A18035F5BB0AB575BE6169593D7DE01B34D4CBA3C42AEE4A34AE0EC30727
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
1
# of downloads :
165
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
DNS request
Sending a custom TCP request
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
n/a
Score:
21 / 100
Signature
a
c
d
e
f
h
I
l
m
n
o
p
s
t
u
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 288268 Sample: e325b.pdf Startdate: 21/09/2020 Architecture: WINDOWS Score: 21 23 Initial sample is a PE file and has a suspicious name 2->23 7 AcroRd32.exe 37 2->7         started        process3 process4 9 RdrCEF.exe 45 7->9         started        12 AcroRd32.exe 2 5 7->12         started        dnsIp5 19 192.168.2.1 unknown unknown 9->19 14 RdrCEF.exe 9->14         started        17 RdrCEF.exe 9->17         started        process6 dnsIp7 21 80.0.0.0 NTLGB United Kingdom 14->21
Threat name:
Win32.Trojan.IcedID
Status:
Malicious
First seen:
2020-09-21 18:28:11 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Verdict:
suspicious
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments