MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 95e8d34230e05023b6e452a58b9e0005d037cfdae1414e88748e2f69a7d675c9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 95e8d34230e05023b6e452a58b9e0005d037cfdae1414e88748e2f69a7d675c9
SHA3-384 hash: fc704dfa7ff61b1dd70512bc3a96824a0340bebc08b11b0ce86fde85788751d8bfbb4addb665c31fb162b8455d263208
SHA1 hash: fb0bbb4ce2f604a5b140ef4a54b80080cba38523
MD5 hash: 543076e49d11302cbe872ac7e4a391d7
humanhash: freddie-quebec-mountain-kilo
File name:themCouldPeopleAThink.txt
Download: download sample
Signature IcedID
File size:134'656 bytes
First seen:2022-08-16 13:09:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 3072:RGwQwCA76xHIfHmOfqeDjVuBBEYCp9e29Fd0oJe:RGwhk5IPrfzVuBBEYCDeE70o
TLSH T1AAD39025E783D1E3C892047582417CE65432BD859FECCFCA9F607FE2985AA299B0DF05
TrID 33.6% (.EXE) OS/2 Executable (generic) (2029/13)
33.1% (.EXE) Generic Win/DOS Executable (2002/3)
33.1% (.EXE) DOS Executable Generic (2000/1)
Reporter pr0xylife
Tags:exe IcedID Stolen ImagesEvidence

Intelligence


File Origin
# of uploads :
1
# of downloads :
277
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
themCouldPeopleAThink.txt
Verdict:
No threats detected
Analysis date:
2022-08-16 13:11:21 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected IcedID
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.IcedID
Status:
Malicious
First seen:
2022-08-16 13:10:07 UTC
File Type:
PE+ (Dll)
AV detection:
15 of 26 (57.69%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Result
Malware family:
Score:
  10/10
Tags:
family:icedid campaign:4082156504 banker loader trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Blocklisted process makes network request
IcedID, BokBot
Malware Config
C2 Extraction:
driophizter.com
Unpacked files
SH256 hash:
95e8d34230e05023b6e452a58b9e0005d037cfdae1414e88748e2f69a7d675c9
MD5 hash:
543076e49d11302cbe872ac7e4a391d7
SHA1 hash:
fb0bbb4ce2f604a5b140ef4a54b80080cba38523
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments