MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b5399025d73dfb850df68017dfa81ce5f83bd9eeb7db056fffeca55ad3bcea65. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: b5399025d73dfb850df68017dfa81ce5f83bd9eeb7db056fffeca55ad3bcea65
SHA3-384 hash: ffb60347cfd579d916ed69d622c1bfd898b68387a99bc64b4e99c5dcd09b9538b47fd9346c6d7ee6f9341f588279cc3f
SHA1 hash: 4411257bd0758059737b7008e71a6b084b90418c
MD5 hash: 5fb43bc53a57acd15ad463d2e6b7c511
humanhash: pasta-twelve-west-aspen
File name:fuzo4.bin
Download: download sample
Signature IcedID
File size:424'448 bytes
First seen:2020-09-17 20:54:52 UTC
Last seen:2020-09-17 21:59:26 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 3b6e2175af86921dd64f036f269cc49a (1 x IcedID)
ssdeep 6144:7l7Kr0ltJNgXq0KETxSInnNyduspvH/fN176+uCZV7T0zau/7Ia:7FKr0lt7g60vFSOA8spi+PZp0zau/7t
Threatray 140 similar samples on MalwareBazaar
TLSH CF942901B7A18034F5FF16F975BE6168953D7DA15B3084CB93C42AEE5A34AE0AE30B17
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
2
# of downloads :
164
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
DNS request
Sending a custom TCP request
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
60 / 100
Signature
Contains functionality to detect hardware virtualization (CPUID execution measurement)
System process connects to network (likely due to code injection or exploit)
Yara detected IcedID
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 287203 Sample: fuzo4.bin Startdate: 17/09/2020 Architecture: WINDOWS Score: 60 30 www.intel.com 2->30 32 s.twitter.com 2->32 34 help.twitter.com 2->34 50 Yara detected IcedID 2->50 8 loaddll32.exe 1 2->8         started        signatures3 process4 process5 10 rundll32.exe 8->10         started        14 rundll32.exe 8->14         started        16 rundll32.exe 8->16         started        18 3 other processes 8->18 dnsIp6 36 help.twitter.com 10->36 52 System process connects to network (likely due to code injection or exploit) 10->52 20 WerFault.exe 17 9 10->20         started        38 104.244.42.3, 443, 49741, 49743 TWITTERUS United States 14->38 40 www.oracle.com 14->40 46 2 other IPs or domains 14->46 54 Contains functionality to detect hardware virtualization (CPUID execution measurement) 14->54 22 WerFault.exe 3 9 14->22         started        42 s.twitter.com 104.244.42.67, 443, 49740 TWITTERUS United States 16->42 44 www.oracle.com 16->44 48 2 other IPs or domains 16->48 24 WerFault.exe 9 18->24         started        26 WerFault.exe 18->26         started        28 WerFault.exe 18->28         started        signatures7 process8
Threat name:
Win32.Backdoor.Qusarrat
Status:
Malicious
First seen:
2020-09-17 20:56:08 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments