MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c6765b0c795af907637ebc5e0703a285b44041e96d43e81922f8601a2346cafa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: c6765b0c795af907637ebc5e0703a285b44041e96d43e81922f8601a2346cafa
SHA3-384 hash: 7a814ccd668c0b4deb7fd134cbbdb16cac79ebfa106f5f99375d52149dd5939d99b9c35da9a0fcf6caa3dd2dd90168a0
SHA1 hash: a8a213d13e6e91954bd7e46158bf96ef52695bfe
MD5 hash: 7d1233f06811c1baaac3cd45ac6248f7
humanhash: edward-tennis-march-william
File name:loadfsc3.dll
Download: download sample
Signature IcedID
File size:596'992 bytes
First seen:2022-02-14 16:12:38 UTC
Last seen:2022-02-15 13:13:03 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9c098f488680765e44c6773defc21449 (1 x IcedID)
ssdeep 12288:b+vuC7dScPPVP0YChno7GbWCokimAM3lbEEn:b+LZJVP9Chn0GbUkiXMRx
Threatray 35 similar samples on MalwareBazaar
TLSH T1ABC4BF5526A409E6E077943888734907C7B27C72177097DB93E2727B1E3BBD0A63AF21
Reporter r3dbU7z
Tags:exe IcedID spy

Intelligence


File Origin
# of uploads :
3
# of downloads :
343
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control.exe greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
68 / 100
Signature
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Call by Ordinal
Yara detected IcedID
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 572257 Sample: loadfsc3.dll Startdate: 14/02/2022 Architecture: WINDOWS Score: 68 20 hdtrenity.com 2->20 22 Multi AV Scanner detection for domain / URL 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Yara detected IcedID 2->26 28 Sigma detected: Suspicious Call by Ordinal 2->28 8 loaddll64.exe 1 2->8         started        signatures3 process4 process5 10 cmd.exe 1 8->10         started        12 rundll32.exe 8->12         started        14 rundll32.exe 8->14         started        16 2 other processes 8->16 process6 18 rundll32.exe 10->18         started       
Threat name:
Win64.Trojan.IcedID
Status:
Suspicious
First seen:
2022-02-14 16:13:13 UTC
File Type:
PE+ (Dll)
Extracted files:
9
AV detection:
13 of 28 (46.43%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:icedid campaign:412701809 banker suricata trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Drops file in Windows directory
IcedID, BokBot
suricata: ET MALWARE Win32/IcedID Request Cookie
Unpacked files
SH256 hash:
c6765b0c795af907637ebc5e0703a285b44041e96d43e81922f8601a2346cafa
MD5 hash:
7d1233f06811c1baaac3cd45ac6248f7
SHA1 hash:
a8a213d13e6e91954bd7e46158bf96ef52695bfe
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

IcedID

Executable exe c6765b0c795af907637ebc5e0703a285b44041e96d43e81922f8601a2346cafa

(this sample)

  
Delivery method
Distributed via web download

Comments