MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a3845d760f3394981f0e9b2330c279db0534befaaa17c67ded9b3dbd7b9e608f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 13


Intelligence 13 IOCs 3 YARA 10 File information Comments

SHA256 hash: a3845d760f3394981f0e9b2330c279db0534befaaa17c67ded9b3dbd7b9e608f
SHA3-384 hash: ed926c2e7f6d1326c58af92c82c8e63c497109892dd54bd8bd4b72c9b054482f3f5202575ff3257387f20f9809a06bfa
SHA1 hash: 5e07c706ef64a482dcb3ec3100b8fda6e397281f
MD5 hash: 05bcb9a44d2834117ab0466f37698ea7
humanhash: eighteen-wolfram-kitten-yankee
File name:A3845D760F3394981F0E9B2330C279DB0534BEFAAA17C.exe
Download: download sample
Signature IcedID
File size:6'315'768 bytes
First seen:2021-11-01 21:30:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:yLZusv4a6LAiC/eKU4OnK8CGLSWxCEYyNqLDBKdsnz+10nLuHp8cXl3JWGJSO6kr:yQsQRLNuNU4OnKJgRZq3BDnz+10Lwqhe
TLSH T1855633C8CAAACD07EE6C08398AB716B3DABD3422B47601CDE392A40DBD44515DB5F35D
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe IcedID


Avatar
abuse_ch
IcedID C2:
94.103.9.167:61775

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
94.103.9.167:61775 https://threatfox.abuse.ch/ioc/241286/
ndalldoma.ink https://threatfox.abuse.ch/ioc/241287/
80.66.87.55:11327 https://threatfox.abuse.ch/ioc/241288/

Intelligence


File Origin
# of uploads :
1
# of downloads :
268
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
A3845D760F3394981F0E9B2330C279DB0534BEFAAA17C.exe
Verdict:
No threats detected
Analysis date:
2021-11-01 21:32:13 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
arkeistealer azorult barys exploit overlay packed virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Backstage Stealer FormBook RedLine Smoke
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Disable Windows Defender real time protection (registry)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Backstage Stealer
Yara detected FormBook
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 513205 Sample: A3845D760F3394981F0E9B2330C... Startdate: 01/11/2021 Architecture: WINDOWS Score: 100 78 20.189.173.20 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->78 80 162.159.133.233 CLOUDFLARENETUS United States 2->80 124 Malicious sample detected (through community Yara rule) 2->124 126 Antivirus detection for URL or domain 2->126 128 Antivirus detection for dropped file 2->128 130 18 other signatures 2->130 11 A3845D760F3394981F0E9B2330C279DB0534BEFAAA17C.exe 10 2->11         started        signatures3 process4 file5 50 C:\Users\user\AppData\...\setup_installer.exe, PE32 11->50 dropped 14 setup_installer.exe 20 11->14         started        process6 file7 52 C:\Users\user\AppData\...\setup_install.exe, PE32 14->52 dropped 54 C:\Users\user\AppData\...\Wed21d397528a.exe, PE32 14->54 dropped 56 C:\Users\user\AppData\...\Wed21bde2a66e.exe, PE32 14->56 dropped 58 15 other files (10 malicious) 14->58 dropped 17 setup_install.exe 1 14->17         started        process8 dnsIp9 76 127.0.0.1 unknown unknown 17->76 122 Adds a directory exclusion to Windows Defender 17->122 21 cmd.exe 17->21         started        23 cmd.exe 1 17->23         started        25 cmd.exe 17->25         started        27 11 other processes 17->27 signatures10 process11 signatures12 30 Wed2189c449f87f8b6b.exe 21->30         started        35 Wed2161523247d7a89.exe 3 23->35         started        37 Wed2101f89cfd.exe 25->37         started        132 Adds a directory exclusion to Windows Defender 27->132 39 Wed2121ea3f069.exe 27->39         started        41 Wed218eca7e5fadfc1.exe 27->41         started        43 Wed2108ef029de.exe 27->43         started        45 6 other processes 27->45 process13 dnsIp14 82 45.142.182.152 XSSERVERNL Germany 30->82 84 103.155.92.29 TWIDC-AS-APTWIDCLimitedHK unknown 30->84 92 10 other IPs or domains 30->92 60 C:\Users\...\q7H8X55Lx1EGHL7Oy9SmX73B.exe, PE32 30->60 dropped 62 C:\Users\...\Cqysx17XF_rG98Vrc629E3g_.exe, PE32 30->62 dropped 64 C:\Users\user\...\search_hyperfs_204[1].exe, PE32 30->64 dropped 68 28 other files (6 malicious) 30->68 dropped 96 Antivirus detection for dropped file 30->96 98 Creates HTML files with .exe extension (expired dropper behavior) 30->98 100 Tries to harvest and steal browser information (history, passwords, etc) 30->100 102 Disable Windows Defender real time protection (registry) 30->102 86 91.121.67.60 OVHFR France 35->86 104 Detected unpacking (changes PE section rights) 35->104 106 Query firmware table information (likely to detect VMs) 35->106 108 Tries to detect sandboxes and other dynamic analysis tools (window names) 35->108 120 2 other signatures 35->120 110 Machine Learning detection for dropped file 37->110 112 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 37->112 114 Maps a DLL or memory area into another process 37->114 116 Checks if the current machine is a virtual machine (disk enumeration) 37->116 118 Injects a PE file into a foreign processes 39->118 88 74.114.154.18 AUTOMATTICUS Canada 41->88 90 35.205.61.67 GOOGLEUS United States 43->90 94 6 other IPs or domains 45->94 66 C:\Users\user\AppData\...\Wed21d397528a.tmp, PE32 45->66 dropped 47 Wed21d397528a.tmp 45->47         started        file15 signatures16 process17 file18 70 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 47->70 dropped 72 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 47->72 dropped 74 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 47->74 dropped
Threat name:
Win32.Trojan.Fabookie
Status:
Malicious
First seen:
2021-09-23 08:59:43 UTC
AV detection:
23 of 27 (85.19%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:metasploit family:raccoon family:redline family:smokeloader family:socelars family:vidar family:xloader botnet:5043d5e3b118376f4c4ca4eae396c30af7ffb989 botnet:706 botnet:937 botnet:matthew2009 campaign:s0iw aspackv2 backdoor evasion infostealer loader rat spyware stealer themida trojan
Behaviour
Creates scheduled task(s)
Kills process with taskkill
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Vidar Stealer
Xloader Payload
MetaSploit
Process spawned unexpected child process
Raccoon
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
Xloader
Malware Config
C2 Extraction:
http://www.kyiejenner.com/s0iw/
http://honawey70.top/
http://wijibui00.top/
http://govsurplusstore.com/upload/
http://best-forsale.com/upload/
http://chmxnautoparts.com/upload/
http://kwazone.com/upload/
http://brandyjaggers.com/upload/
http://andbal.com/upload/
http://alotofquotes.com/upload/
http://szpnc.cn/upload/
http://uggeboots.com/upload/
http://100klv.com/upload/
http://rapmusic.at/upload/
https://mas.to/@lenka51
https://stacenko668.tumblr.com/
213.166.69.181:64650
Unpacked files
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
52587a260b384278c789b134c8f08d8af9997aedd818c3c6a280d00aaaa77d2d
MD5 hash:
2c509753fac93810c09574a8b56af1e4
SHA1 hash:
e53da7ff5a9cfc3bda21794d639ed1f02cd7a881
SH256 hash:
68223fa16261faf405282fee551520b480eb4132f769b73c9fa707adf00539f6
MD5 hash:
05378594f7196c773e7f8d8670907c43
SHA1 hash:
c829048f7221f3641434b1386490a320dc6d3b4b
SH256 hash:
54e9518e67e1c857e4fed1698539f196f4b41c9f4907ea9d00c082d858b9847f
MD5 hash:
d1d8061e4992805ca1668a3d95632fe2
SHA1 hash:
93890f3918a99b03a3e18aaff0c6f1a6f55f096d
SH256 hash:
cc5f4d44f395885cc6fd2a62016a73d79436c26bbdad4d253b3d838ee8e280d5
MD5 hash:
e89724e92dd14f86800b607fd3f3c0e8
SHA1 hash:
7f3118d3545987f7abf7c5c0a76392236ca8a9f2
SH256 hash:
f4d57e598308c7cc2809b3ffeeb4ec1e2f173ea03bb0a3dbdbd372f4daca67fc
MD5 hash:
b7d7428596293e07225ded1012cac1d8
SHA1 hash:
7e89daecafed8418486a7f98642f0ab7ff2c2ee9
SH256 hash:
44d9fd9530b4e71dffba8686a511db18245828db69816f71f8dd734b5f1e8ae1
MD5 hash:
a08a7049ee8760c2abc36ed8b171abc4
SHA1 hash:
6576f515e323fd39e63430b88af9e94d2aa953ae
SH256 hash:
28075a549bdab77f84b1dbbbafa58b1149380268e220544d762211f1db0888e3
MD5 hash:
738fafa1e6ac55bc4e7cba7183532f02
SHA1 hash:
64744c7f22842a9133f54f87c659a5da03b57d4f
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
6851e02d3f4b8179b975f00bbc86602a2f2f84524f548876eb656db7ea5eaa9c
MD5 hash:
c5124caf4aea3a83b63a9108fe0dcef8
SHA1 hash:
a43a5a59038fca5a63fa526277f241f855177ce6
SH256 hash:
c1469a10ddc4629dec27372a61ec86d1f53e9b27b7490cd55bba7aaf58356360
MD5 hash:
537cc9652d9de278601b236f5ac35795
SHA1 hash:
289e4cde3dcd009542ecce887afe59533c756f30
SH256 hash:
56fd7bd4c5c3d803a1c028d1a3abead0c5c6fa5b54ae21f24058c019da9fd71e
MD5 hash:
bd63f4997ffcccdb954de6fce173522b
SHA1 hash:
1e9d3a921ea29845e7e8ea1046c996790ccb329b
SH256 hash:
1778a6b25f9ac7d1bf1782d1196ac5254ed46e70033a38f391d02939d5b733da
MD5 hash:
3b32aabc7aad3bbfd7226cc614743f48
SHA1 hash:
ea748309ac48558506ddf93b45369b41f641126e
SH256 hash:
66d9e7d002b91df4aa572228d3c4a1d41997fff54555d0aa2e903f993f307814
MD5 hash:
17df2b7340cf3291107bfd454d0ca856
SHA1 hash:
00458e02751bb0e2cc268730a0cac2689249b1a7
SH256 hash:
15dd9667f33c8979b9775d9e15f405b6844959c1a7fec34d3377dc51ce0e58c0
MD5 hash:
ec73d7de788ad7ed996ab0e75ed1cade
SHA1 hash:
5b01a1de6d0a6d76677233a215390f7592e84194
SH256 hash:
fab9d65c0c374826c21efaff850554796bdd84ba1d2e4ff9ba4e30b2e99fddfc
MD5 hash:
c899c9c146892b81fd85dfb0c95781ae
SHA1 hash:
f7a31315a5aaa8b95aff513fd0d628823a27613d
SH256 hash:
4c86bde839eccff214f7ef2679fd871f69739bf4151c823118051597becea8e8
MD5 hash:
f9da67dff44dd65aff19d4ba4a9e509a
SHA1 hash:
880fc7878440e01c82ea966de4e421db51dce154
SH256 hash:
0a80e066350c67ab418ee7ff7506c0d5ff5efa70af2d2520a0d304bd296d21d5
MD5 hash:
51dfa5757e5b6026b649b8129200ff9f
SHA1 hash:
b524d82ada758f47baae415e61fa6cb5c200f216
Detections:
win_socelars_auto
SH256 hash:
6ced20adbce78d23d967afdd7e80ffb845348b1bdce8eff8eef445739455f4d3
MD5 hash:
50cc9210c74d338a3ebf98ec6557413e
SHA1 hash:
9704daeccf98fc1996b788988cbf8c4f4567d690
SH256 hash:
a3845d760f3394981f0e9b2330c279db0534befaaa17c67ded9b3dbd7b9e608f
MD5 hash:
05bcb9a44d2834117ab0466f37698ea7
SHA1 hash:
5e07c706ef64a482dcb3ec3100b8fda6e397281f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:SUSP_XORed_Mozilla_RID2DB4
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:XOREngine_Misc_XOR_Func
Author:smiller cc @florian @wesley idea on implementation with yara's built in XOR function
Description:Use with care, https://twitter.com/cyb3rops/status/1237042104406355968

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments