MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9f8ff8da154960d17a3225675a85372e7a70aca93df8bdfb887eb22c16b4dfe3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 9f8ff8da154960d17a3225675a85372e7a70aca93df8bdfb887eb22c16b4dfe3
SHA3-384 hash: 9127d2b2c64fb8d3767b3f5d8d1c575a1b03092aec5bb0eac4ecc975f5ae5abb4a23b3a649c08b9b654efd75b524d191
SHA1 hash: 5e338c4b9355c7e78639857647fa3c7af63fed49
MD5 hash: af7676dc809a385c9084b18121b56560
humanhash: three-social-mirror-winner
File name:fuzo9.bin
Download: download sample
Signature IcedID
File size:216'576 bytes
First seen:2020-09-17 20:55:22 UTC
Last seen:2020-09-17 21:59:13 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash d26d819c9035c795a5bbe4bce9b3d935 (12 x IcedID)
ssdeep 6144:6ZLwpyyWMa3NIBkL6LDW8dTZdw702edvxiuYOO6umz4:6ZLwpyyHadIBkLIi8dTL2SvguYOO1mk
Threatray 311 similar samples on MalwareBazaar
TLSH 6D24AE117940C0B2D1EE1A385478DABA427DB9644FF588EFA7D8073E5E342C26B34E67
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
2
# of downloads :
167
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
DNS request
Sending a custom TCP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
48 / 100
Signature
(
)
c
d
e
i
j
k
l
m
n
o
p
r
S
t
u
w
x
y
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 287202 Sample: fuzo9.bin Startdate: 17/09/2020 Architecture: WINDOWS Score: 48 27 www.intel.com 2->27 29 www.intel.ch 2->29 31 4 other IPs or domains 2->31 7 loaddll32.exe 1 2->7         started        process3 process4 9 rundll32.exe 7->9         started        13 rundll32.exe 7->13         started        15 rundll32.exe 7->15         started        17 3 other processes 7->17 dnsIp5 33 104.244.42.131, 443, 49737, 49740 TWITTERUS United States 9->33 35 help.twitter.com 9->35 41 System process connects to network (likely due to code injection or exploit) 9->41 37 s.twitter.com 104.244.42.3, 443, 49736, 49739 TWITTERUS United States 13->37 39 help.twitter.com 13->39 19 WerFault.exe 20 9 15->19         started        21 WerFault.exe 9 17->21         started        23 WerFault.exe 3 17->23         started        25 WerFault.exe 3 17->25         started        signatures6 process7
Threat name:
Win32.Trojan.IcedID
Status:
Malicious
First seen:
2020-09-17 20:57:06 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments