MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9e6e3e7c605547601964990bda7c213c62b9ad22c1c95119053e947fb97df5ac. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 9e6e3e7c605547601964990bda7c213c62b9ad22c1c95119053e947fb97df5ac
SHA3-384 hash: de88f279f38ba2c76611efbc2ccd2e14ec8e7de237d6b8ce2116fa939b9126ab77677fbe563a9b87e06f359dfb0dbf63
SHA1 hash: f724dec8bd21685e515e245c71a4a27c6a5c2ffa
MD5 hash: 2d4c4264157d35bd36b7811e65ba2390
humanhash: nuts-glucose-berlin-fourteen
File name:bZxBs.pdf
Download: download sample
Signature IcedID
File size:353'282 bytes
First seen:2020-10-30 00:33:22 UTC
Last seen:2020-10-30 02:48:37 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 602df2fbddc1b61fc28107e52898ede0 (8 x IcedID)
ssdeep 6144:l3zDUbuCM/zV1boMSThnjOEt+Ay15GaC14qQQd/ZzRzYNjNo/+qnAB:l3iubgM613t+AyiaCdVdRtzYNjNo/+I0
Threatray 520 similar samples on MalwareBazaar
TLSH ED74BE02BE818070DAA346790469C771473EBE664B214FDBB3D83E9F1A744D19B35BA3
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
2
# of downloads :
109
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending a custom TCP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Initial sample is a PE file and has a suspicious name
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 307413 Sample: bZxBs.pdf Startdate: 30/10/2020 Architecture: WINDOWS Score: 52 23 Multi AV Scanner detection for submitted file 2->23 25 Initial sample is a PE file and has a suspicious name 2->25 7 AcroRd32.exe 37 2->7         started        process3 process4 9 RdrCEF.exe 44 7->9         started        12 AcroRd32.exe 2 5 7->12         started        dnsIp5 19 192.168.2.1 unknown unknown 9->19 14 RdrCEF.exe 9->14         started        17 RdrCEF.exe 9->17         started        process6 dnsIp7 21 80.0.0.0 NTLGB United Kingdom 14->21
Threat name:
Win32.Trojan.IcedID
Status:
Malicious
First seen:
2020-10-29 19:10:08 UTC
AV detection:
17 of 29 (58.62%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:icedid banker trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Blacklisted process makes network request
IcedID, BokBot
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments