MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c261f0485413423ba3ec19f237f3f65edaf79f7fba874ddf46a80bceb7a0f0da. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 5 File information Comments

SHA256 hash: c261f0485413423ba3ec19f237f3f65edaf79f7fba874ddf46a80bceb7a0f0da
SHA3-384 hash: b273a1d2d817ffc792de81ecc38ea5d6c3ba772d931e56133a2a47583303ca778f7e779d01fb077847b0df738e850de2
SHA1 hash: dfc175eb83b194a4d50fd759405cadf3e9b5eb93
MD5 hash: f94d49f937d0c65ac3d63c5fc21da2c3
humanhash: charlie-six-illinois-black
File name:f94d49f937d0c65ac3d63c5fc21da2c3.dll
Download: download sample
Signature IcedID
File size:266'725 bytes
First seen:2022-02-04 23:46:02 UTC
Last seen:2022-02-05 01:38:16 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7c9801a7dac8f608b21d94173728a051 (2 x IcedID)
ssdeep 6144:dkQipmwUE/DCowoQnWFwSaXuWxyEeWyGrHnAQ:dSpmwUE/Gowo2ewSJSybOnH
Threatray 4 similar samples on MalwareBazaar
TLSH T15B448E56B29518B9D87BC07CC2534A21BBB27C510721FEFF12A492366F277D06A3DB24
Reporter abuse_ch
Tags:dll exe IcedID


Avatar
abuse_ch
IcedID C2:
hdtrenity.com

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
hdtrenity.com https://threatfox.abuse.ch/ioc/374344/

Intelligence


File Origin
# of uploads :
2
# of downloads :
314
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
f94d49f937d0c65ac3d63c5fc21da2c3.dll
Verdict:
No threats detected
Analysis date:
2022-02-04 23:51:02 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
CheckCmdLine
EvasionQueryPerformanceCounter
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Regsvr32 Network Activity
Sigma detected: Suspicious Call by Ordinal
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected IcedID
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 566869 Sample: nU1VvEyHKj.dll Startdate: 05/02/2022 Architecture: WINDOWS Score: 100 51 Multi AV Scanner detection for domain / URL 2->51 53 Found malware configuration 2->53 55 Antivirus detection for URL or domain 2->55 57 5 other signatures 2->57 7 loaddll64.exe 1 2->7         started        process3 dnsIp4 31 hdtrenity.com 7->31 33 tp.8e49140c2-frontier.amazon.com 7->33 35 2 other IPs or domains 7->35 65 Contains functionality to detect hardware virtualization (CPUID execution measurement) 7->65 67 Tries to detect virtualization through RDTSC time measurements 7->67 11 cmd.exe 1 7->11         started        13 regsvr32.exe 7->13         started        17 rundll32.exe 7->17         started        19 2 other processes 7->19 signatures5 process6 dnsIp7 21 rundll32.exe 11->21         started        37 hdtrenity.com 185.99.132.51, 49757, 49758, 49759 ZAPPIE-HOST-ASZappieHostGB Belarus 13->37 39 dr49lng3n1n2s.cloudfront.net 13.224.92.74, 443, 49754, 49755 AMAZON-02US United States 13->39 45 2 other IPs or domains 13->45 69 Contains functionality to detect hardware virtualization (CPUID execution measurement) 13->69 71 Tries to detect virtualization through RDTSC time measurements 13->71 47 2 other IPs or domains 17->47 73 System process connects to network (likely due to code injection or exploit) 17->73 41 tp.8e49140c2-frontier.amazon.com 19->41 43 tp.8e49140c2-frontier.amazon.com 19->43 49 2 other IPs or domains 19->49 signatures8 process9 dnsIp10 25 hdtrenity.com 21->25 27 tp.8e49140c2-frontier.amazon.com 21->27 29 2 other IPs or domains 21->29 59 System process connects to network (likely due to code injection or exploit) 21->59 61 Contains functionality to detect hardware virtualization (CPUID execution measurement) 21->61 63 Tries to detect virtualization through RDTSC time measurements 21->63 signatures11
Gathering data
Threat name:
Win64.Trojan.IcedID
Status:
Malicious
First seen:
2022-02-04 23:47:08 UTC
File Type:
PE+ (Dll)
AV detection:
16 of 28 (57.14%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:icedid campaign:3840329038 banker persistence trojan
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Drops file in Windows directory
Sets service image path in registry
IcedID, BokBot
Malware Config
C2 Extraction:
hdtrenity.com
Unpacked files
SH256 hash:
c261f0485413423ba3ec19f237f3f65edaf79f7fba874ddf46a80bceb7a0f0da
MD5 hash:
f94d49f937d0c65ac3d63c5fc21da2c3
SHA1 hash:
dfc175eb83b194a4d50fd759405cadf3e9b5eb93
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:crime_win32_icedid_stage1
Author:Rony (@r0ny_123)
Description:Detects IcedID Photoloader
Reference:https://sysopfb.github.io/malware,/icedid/2020/04/28/IcedIDs-updated-photoloader.html
Rule name:Emotet
Author:Dhanunjaya
Description:Yara Rule To Detect Emotet
Rule name:IcedID_init_loader
Author:@bartblaze
Description:Identifies IcedID (stage 1 and 2, initial loaders).
Rule name:MAL_IcedID_GZIP_LDR_202104
Author:Thomas Barabosch, Telekom Security
Description:2021 initial Bokbot / Icedid loader for fake GZIP payloads
Reference:https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Rule name:win_iceid_gzip_ldr_202104
Author:Thomas Barabosch, Telekom Security
Description:2021 initial Bokbot / Icedid loader for fake GZIP payloads

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments