MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a5f81b3f092a05dc7026957e5d716e5976a38b152d1823ac76b84e189aa4a75b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: a5f81b3f092a05dc7026957e5d716e5976a38b152d1823ac76b84e189aa4a75b
SHA3-384 hash: 1e137fc252455771a0260f360f8e512a527a8064c938ba4c5883830b888c0ac5a6ca30bad93e518994425229ddd1f0ea
SHA1 hash: 799aa640d9393c482033bc58e6c8df845e6c7276
MD5 hash: 8a0f5061861085e50d4b9e65e00244d6
humanhash: march-oranges-washington-harry
File name:Scan_Invoice_12-09#100.msi
Download: download sample
Signature IcedID
File size:843'776 bytes
First seen:2022-12-10 05:17:37 UTC
Last seen:2022-12-10 06:29:07 UTC
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 24576:qHL0Z9mTn3Tp9Lol90aID/kJAHCgWPXoPcTPbgrQlRNKIg8gx:qr0Za3k90ogWPXoPcTPbgrQlRNKIg8g
Threatray 1'260 similar samples on MalwareBazaar
TLSH T1CA053A13E37210E5D8B6C2398A677627B9F13C2543349BD75710762A4F72BF0AA3A385
TrID 53.7% (.MST) Windows SDK Setup Transform script (61000/1/5)
39.2% (.MSP) Windows Installer Patch (44509/10/5)
7.0% (.) Generic OLE2 / Multistream Compound (8000/1)
Reporter malware_traffic
Tags:BokBot broskabrwaf.com IcedID msi password: u753`

Intelligence


File Origin
# of uploads :
2
# of downloads :
150
Origin country :
US US
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed rundll32.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Heracles
Status:
Malicious
First seen:
2022-12-10 05:18:08 UTC
File Type:
Binary (Archive)
Extracted files:
32
AV detection:
6 of 39 (15.38%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Enumerates connected drives
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments