MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9ad02a119c0df3fb652557b2b5c3136a3fb7f80e78774f1bffd5237eb2d9a514. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 9ad02a119c0df3fb652557b2b5c3136a3fb7f80e78774f1bffd5237eb2d9a514
SHA3-384 hash: 97cb88f0906b64cb2019d64705ab058c7e8d0b82b5b434d1aba04f3ef33329aa76a30d3a302206e39b37bf3d36a9719c
SHA1 hash: c80d5000eb581c1c7246d657419b9d8001d11512
MD5 hash: 7282aa3b1b192586026943ee2880c388
humanhash: uranus-oxygen-charlie-pasta
File name:2020-07-14-IcedID-EXE-persistent-on-infected-Windows-host.bin
Download: download sample
Signature IcedID
File size:569'344 bytes
First seen:2020-07-15 08:21:39 UTC
Last seen:2020-07-15 09:11:10 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c62bded68d26272c82bc4e701827535c (1 x IcedID)
ssdeep 6144:l25c/3uO19QAlaCo+D/VY4H9ubPVuEJxFp9dgtrIl1U76TWxqUJ:A+9QAQCZZad1/p9dgt8zU/xT
Threatray 2'825 similar samples on MalwareBazaar
TLSH C3C48C4476D490ABE8260A714C9BB36417B87C35DA424F0B7EE9379FF931232491E3AD
Reporter JAMESWT_WT
Tags:IcedID IceID

Intelligence


File Origin
# of uploads :
2
# of downloads :
158
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Sending a custom TCP request
Threat name:
Win32.Trojan.IcedID
Status:
Malicious
First seen:
2020-07-15 05:59:15 UTC
File Type:
PE (Exe)
Extracted files:
67
AV detection:
35 of 48 (72.92%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware
Behaviour
Suspicious behavior: EnumeratesProcesses
Modifies registry class
Suspicious use of WriteProcessMemory
Modifies registry class
Gathers system information
Runs net.exe
Gathers network information
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Discovers systems in the same network
Suspicious use of WriteProcessMemory
Loads dropped DLL
Reads user/profile data of web browsers
Deletes itself
Reads user/profile data of web browsers
Deletes itself
Loads dropped DLL
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments