MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 866aa2c9699ab1427f23c3754e7b94358366d2c55e2ff512f26f16a22fa443b8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 866aa2c9699ab1427f23c3754e7b94358366d2c55e2ff512f26f16a22fa443b8
SHA3-384 hash: 8069d87f961172e152868946ef4bbd0d6d40cc9f1306884d8962cfcdafb38a16cc3016fa75f6b1457eda36a227356a59
SHA1 hash: 49fc991853c5a9e73824e894bfbefb45c61d322f
MD5 hash: db355c0cb3be879a1207cf8a679069ee
humanhash: may-low-indigo-happy
File name:test.pdf
Download: download sample
Signature IcedID
File size:122'970 bytes
First seen:2020-09-16 17:30:49 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 4ae6e9cb7bec07702ed9dc9956da79ac (11 x IcedID)
ssdeep 3072:tpteWUxswmB6cKEyYo8wNSNbgRdN1v48zdtye:cswm5KloaSNERdN1Agr
Threatray 356 similar samples on MalwareBazaar
TLSH 50C3BF167694C2FAD58E42306E158B2A63FDFD304EE1C5076FA6378E6D729D0D92230B
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
1
# of downloads :
129
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Sending a custom TCP request
Sending a UDP request
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
n/a
Score:
22 / 100
Signature
a
c
d
e
f
h
I
l
m
n
o
p
s
t
u
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 286532 Sample: test.pdf Startdate: 16/09/2020 Architecture: WINDOWS Score: 22 23 Initial sample is a PE file and has a suspicious name 2->23 7 AcroRd32.exe 37 2->7         started        process3 process4 9 RdrCEF.exe 45 7->9         started        12 AcroRd32.exe 2 5 7->12         started        dnsIp5 19 192.168.2.1 unknown unknown 9->19 14 RdrCEF.exe 9->14         started        17 RdrCEF.exe 9->17         started        process6 dnsIp7 21 80.0.0.0 NTLGB United Kingdom 14->21
Threat name:
Win32.Trojan.Emotet
Status:
Malicious
First seen:
2020-09-16 17:31:07 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments