MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c7fd1d9a9cd1fd3351c43763d262ba441d725ad6e34f6a842edb8ce77ac7a614. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: c7fd1d9a9cd1fd3351c43763d262ba441d725ad6e34f6a842edb8ce77ac7a614
SHA3-384 hash: f2e8d56ecb36153015ee9a3f8737b91b2bea07d4a93555ba9b7754993cfee2813412c3bae840adcb350345ab1f5c2fc0
SHA1 hash: 96d91b1ec617bc3cfc00bcc515cd7ebb05bba366
MD5 hash: b91b76fc65623354dc7709cc4dfbd8fe
humanhash: emma-mobile-october-monkey
File name:2020-07-14-DLL-for-IcedID-installer-example-18-of-18.bin
Download: download sample
Signature IcedID
File size:162'816 bytes
First seen:2020-07-15 08:20:21 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash e8fbd6da0d38f3c7dc051ba3209cd26f (17 x IcedID)
ssdeep 3072:jByDMAeNB5Klc5Sh2Y0ylyCAK0u3q33U3A3ymr+rvo:jBS6BslU2T0PKI3k3An+rvo
Threatray 784 similar samples on MalwareBazaar
TLSH CDF38B05BA40C071D5BE1D384931D7AA0B7D7C30EFD19A8B77C42A6E1EB12D0AD35EA6
Reporter JAMESWT_WT
Tags:dll IcedID IceID

Intelligence


File Origin
# of uploads :
1
# of downloads :
130
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Sending a custom TCP request
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-07-15 05:59:04 UTC
File Type:
PE (Dll)
Extracted files:
26
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Modifies system certificate store
Suspicious use of WriteProcessMemory
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments