MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9035c7f39f0b9894cd46fc60036373ec73fad2ed3db1b39c2b8b3c8f4194a151. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 11


Intelligence 11 IOCs 1 YARA File information Comments

SHA256 hash: 9035c7f39f0b9894cd46fc60036373ec73fad2ed3db1b39c2b8b3c8f4194a151
SHA3-384 hash: 95badef3b435981057244f684af0ee1039bb3401ec133bcd32c5210d063210171a9c8ec8008ef06d003bcb52ad52334e
SHA1 hash: 8b267a81ad500d560f408af4355e7c749ff4f794
MD5 hash: 2f007ccfe55b659c7cee3131f9d7cd20
humanhash: arkansas-uranus-beryllium-early
File name:2f007ccfe55b659c7cee3131f9d7cd20.dll
Download: download sample
Signature IcedID
File size:117'382 bytes
First seen:2021-12-21 17:31:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 08dc3d43b276021a0704807103d3924a (12 x IcedID, 1 x BazaLoader)
ssdeep 3072:pCiWrk4232Jlpwqeh01jYku1SQ9A3N2AUTY6:gif2Jlpwq6yYki9AE
Threatray 108 similar samples on MalwareBazaar
TLSH T1F5B36B1762A9007FE13792B4C1839B12DBB27D0163646BEF039542691F5B7E0AE3AF71
Reporter abuse_ch
Tags:dll exe IcedID


Avatar
abuse_ch
IcedID C2:
grendafolz.com

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
grendafolz.com https://threatfox.abuse.ch/ioc/263350/

Intelligence


File Origin
# of uploads :
1
# of downloads :
268
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2f007ccfe55b659c7cee3131f9d7cd20.dll
Verdict:
No threats detected
Analysis date:
2021-12-21 17:36:08 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
CheckCmdLine
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Found malware configuration
Multi AV Scanner detection for domain / URL
Sigma detected: Suspicious Call by Ordinal
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected IcedID
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 543597 Sample: Is6hIWaFfP.dll Startdate: 21/12/2021 Architecture: WINDOWS Score: 100 51 Multi AV Scanner detection for domain / URL 2->51 53 Found malware configuration 2->53 55 Antivirus detection for URL or domain 2->55 57 3 other signatures 2->57 7 loaddll64.exe 1 2->7         started        process3 dnsIp4 31 grendafolz.com 7->31 33 tp.8e49140c2-frontier.amazon.com 7->33 35 2 other IPs or domains 7->35 65 Contains functionality to detect hardware virtualization (CPUID execution measurement) 7->65 67 Tries to detect virtualization through RDTSC time measurements 7->67 11 cmd.exe 1 7->11         started        13 regsvr32.exe 7->13         started        17 rundll32.exe 7->17         started        19 2 other processes 7->19 signatures5 process6 dnsIp7 21 rundll32.exe 11->21         started        37 grendafolz.com 185.99.133.24, 49778, 49780, 49781 ZAPPIE-HOST-ASZappieHostGB Belarus 13->37 39 dr49lng3n1n2s.cloudfront.net 99.86.235.74, 443, 49769, 49770 AMAZON-02US United States 13->39 45 2 other IPs or domains 13->45 69 Contains functionality to detect hardware virtualization (CPUID execution measurement) 13->69 71 Tries to detect virtualization through RDTSC time measurements 13->71 47 2 other IPs or domains 17->47 73 System process connects to network (likely due to code injection or exploit) 17->73 41 tp.8e49140c2-frontier.amazon.com 19->41 43 tp.8e49140c2-frontier.amazon.com 19->43 49 2 other IPs or domains 19->49 signatures8 process9 dnsIp10 25 grendafolz.com 21->25 27 tp.8e49140c2-frontier.amazon.com 21->27 29 2 other IPs or domains 21->29 59 System process connects to network (likely due to code injection or exploit) 21->59 61 Contains functionality to detect hardware virtualization (CPUID execution measurement) 21->61 63 Tries to detect virtualization through RDTSC time measurements 21->63 signatures11
Threat name:
Win64.Trojan.IcedID
Status:
Malicious
First seen:
2021-12-21 17:32:10 UTC
File Type:
PE+ (Dll)
Extracted files:
1
AV detection:
19 of 28 (67.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:icedid campaign:1778413602 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Program crash
IcedID, BokBot
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
grendafolz.com
Unpacked files
SH256 hash:
9035c7f39f0b9894cd46fc60036373ec73fad2ed3db1b39c2b8b3c8f4194a151
MD5 hash:
2f007ccfe55b659c7cee3131f9d7cd20
SHA1 hash:
8b267a81ad500d560f408af4355e7c749ff4f794
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

IcedID

Executable exe 9035c7f39f0b9894cd46fc60036373ec73fad2ed3db1b39c2b8b3c8f4194a151

(this sample)

  
Delivery method
Distributed via web download

Comments