MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a88e307cb670ab541c95ae2b73b03dc1a038cf3a9f5dab21281d3aadb3abc1a8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: a88e307cb670ab541c95ae2b73b03dc1a038cf3a9f5dab21281d3aadb3abc1a8
SHA3-384 hash: 8158932fd870a9ab6e7954395623535071c5b8836c0599ca2f25040d5860cef02158345e6835df4c3da8f2e7e786475d
SHA1 hash: 8b65803838bab20a3063096e4126773d11980cbc
MD5 hash: 535ce5928235e89f31f8ef5f1214051d
humanhash: georgia-diet-charlie-stairway
File name:temp.tmp
Download: download sample
Signature IcedID
File size:80'896 bytes
First seen:2020-08-18 18:46:02 UTC
Last seen:2020-08-18 20:12:03 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash da49903e71c67c83a50340939f3c1201 (7 x IcedID)
ssdeep 1536:Ec0vMvJaXIrGqKboDXTMrf/jiFkKo5v8BC+7+y2:L0vQKboDEkkfA7+y2
Threatray 598 similar samples on MalwareBazaar
TLSH 9B839E10F454C872C047993D4414D3B19A2B7931BE7689873FD41ABE6F322E19B36FAA
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
2
# of downloads :
156
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Sending a custom TCP request
DNS request
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-08-18 18:47:05 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments