MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a61b1d70d469b8ca7acdbd26fc859e6aeb229c4636fe9c92eac856914f326ac8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: a61b1d70d469b8ca7acdbd26fc859e6aeb229c4636fe9c92eac856914f326ac8
SHA3-384 hash: cd9524960fe91c17bcf09e530272bdc4a59f993d7044bfdcdefa50be1f25bb4ab31c788b0fbe2814d70bce2b1c173463
SHA1 hash: 317dc24bd0601d237240084e4f939d707e5ff625
MD5 hash: b5240bcd8ea05ed12e9e8e51a09f25c3
humanhash: carbon-october-stream-edward
File name:SecuriteInfo.com.Trojan.Win64.Crypt.7196.2196
Download: download sample
Signature IcedID
File size:180'224 bytes
First seen:2022-01-28 09:01:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 616c436c7831fb3dbff4f23b2e172057 (2 x IcedID)
ssdeep 3072:J3lW6VPgwG7avse2xBz2Jyx0/x6Mpa0vL79:B3Vs7yb2niJNrP9
Threatray 151 similar samples on MalwareBazaar
TLSH T1C004901766EC7CDAD07286B0B77787C4C32EFC145660DA6E12D0124A5E7F2927E26BE0
File icon (PE):PE icon
dhash icon 6edbb12b17172b96 (10 x Quakbot, 9 x Heodo, 7 x BazaLoader)
Reporter SecuriteInfoCom
Tags:exe IcedID

Intelligence


File Origin
# of uploads :
1
# of downloads :
250
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Trojan.Win64.Crypt.7196.2196
Verdict:
No threats detected
Analysis date:
2022-01-28 11:07:36 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
DNS request
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
MeasuringTime
CheckCmdLine
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware wacatac
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Regsvr32 Network Activity
Sigma detected: Suspicious Call by Ordinal
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected IcedID
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 562023 Sample: SecuriteInfo.com.Trojan.Win... Startdate: 28/01/2022 Architecture: WINDOWS Score: 100 59 Multi AV Scanner detection for domain / URL 2->59 61 Found malware configuration 2->61 63 Antivirus detection for URL or domain 2->63 65 5 other signatures 2->65 7 loaddll64.exe 1 2->7         started        process3 dnsIp4 53 carpricegoods.com 7->53 55 tp.8e49140c2-frontier.amazon.com 7->55 57 2 other IPs or domains 7->57 73 Contains functionality to detect hardware virtualization (CPUID execution measurement) 7->73 75 Tries to detect virtualization through RDTSC time measurements 7->75 11 cmd.exe 1 7->11         started        13 regsvr32.exe 7->13         started        16 rundll32.exe 7->16         started        19 2 other processes 7->19 signatures5 process6 dnsIp7 21 rundll32.exe 11->21         started        77 Contains functionality to detect hardware virtualization (CPUID execution measurement) 13->77 79 Tries to detect virtualization through RDTSC time measurements 13->79 25 regsvr32.exe 13->25         started        29 tp.8e49140c2-frontier.amazon.com 16->29 31 dr49lng3n1n2s.cloudfront.net 16->31 33 aws.amazon.com 16->33 81 System process connects to network (likely due to code injection or exploit) 16->81 35 carpricegoods.com 185.81.114.99, 49687, 49688, 49689 HZ-NL-ASGB United Kingdom 19->35 37 tp.8e49140c2-frontier.amazon.com 19->37 39 5 other IPs or domains 19->39 27 conhost.exe 19->27         started        signatures8 process9 dnsIp10 41 carpricegoods.com 21->41 43 dr49lng3n1n2s.cloudfront.net 13.225.27.74, 443, 49684, 49685 AMAZON-02US United States 21->43 51 2 other IPs or domains 21->51 67 System process connects to network (likely due to code injection or exploit) 21->67 69 Contains functionality to detect hardware virtualization (CPUID execution measurement) 21->69 71 Tries to detect virtualization through RDTSC time measurements 21->71 45 carpricegoods.com 25->45 47 tp.8e49140c2-frontier.amazon.com 25->47 49 aws.amazon.com 25->49 signatures11
Threat name:
Win64.Trojan.BazarLoader
Status:
Malicious
First seen:
2022-01-28 07:46:35 UTC
File Type:
PE+ (Dll)
Extracted files:
17
AV detection:
17 of 28 (60.71%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
a61b1d70d469b8ca7acdbd26fc859e6aeb229c4636fe9c92eac856914f326ac8
MD5 hash:
b5240bcd8ea05ed12e9e8e51a09f25c3
SHA1 hash:
317dc24bd0601d237240084e4f939d707e5ff625
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

IcedID

Executable exe a61b1d70d469b8ca7acdbd26fc859e6aeb229c4636fe9c92eac856914f326ac8

(this sample)

  
Delivery method
Distributed via web download

Comments