MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 94349d76ec1a0c4f60d8d6b59e5dd0883a533a17c9a7c7a87cab5d4540e5d4ea. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 94349d76ec1a0c4f60d8d6b59e5dd0883a533a17c9a7c7a87cab5d4540e5d4ea
SHA3-384 hash: 6b5f0789adfc42d8e0bef84a1d5d7286c5063ccf1bcfac4a3d63e80cff056a732e2e09f6a65873128c11e694c5b87faf
SHA1 hash: e054b2d8fa69c20895c1dc9280932a01b8bcc5ed
MD5 hash: f1824a2c99c949e4878f5d00bb7c9b56
humanhash: zebra-equal-finch-glucose
File name:preview.jpg
Download: download sample
Signature IcedID
File size:172'034 bytes
First seen:2020-08-13 18:51:01 UTC
Last seen:2020-08-13 19:43:50 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 7dba58da61785bfb99de571c94414d2d (12 x IcedID, 2 x Gozi)
ssdeep 1536:hF+KOaaJzE/2b3RDdJQ5ZU5m/Yzs/8OXmlW3nuZtH2WY8+pt6PytN8bUMWfy:hF6JAkhR2SsfmZtH/+poPANjTfy
Threatray 567 similar samples on MalwareBazaar
TLSH B7F37D113AE28071F267063E8260CA51CF7D39537ABED78FA7D4079EE9639805B313A5
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
2
# of downloads :
166
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending a custom TCP request
Connection attempt
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
60 / 100
Signature
Contains functionality to detect hardware virtualization (CPUID execution measurement)
System process connects to network (likely due to code injection or exploit)
Yara detected IcedID
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 266288 Sample: preview.jpg Startdate: 15/08/2020 Architecture: WINDOWS Score: 60 32 Yara detected IcedID 2->32 6 loaddll32.exe 1 2->6         started        process3 process4 8 rundll32.exe 6->8         started        12 rundll32.exe 6->12         started        14 rundll32.exe 6->14         started        16 rundll32.exe 6->16         started        dnsIp5 18 s.twitter.com 104.244.42.131, 443, 49776 TWITTERUS United States 8->18 20 www.oracle.com 8->20 26 6 other IPs or domains 8->26 34 System process connects to network (likely due to code injection or exploit) 8->34 36 Contains functionality to detect hardware virtualization (CPUID execution measurement) 8->36 22 www.oracle.com 12->22 24 support.oracle.com 12->24 28 2 other IPs or domains 14->28 30 2 other IPs or domains 16->30 signatures6
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-08-13 18:52:07 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments