MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ca04842f4ead02f9ca4bb59856102b738ce2fb10bf18a4e087284e5a1b4d1380. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: ca04842f4ead02f9ca4bb59856102b738ce2fb10bf18a4e087284e5a1b4d1380
SHA3-384 hash: c262e510ae7de6d98132b8f4d9b7277f3acb36db4f93d6cc171b16029e5499f77fe0554d92339b64edacfa9380e0d18e
SHA1 hash: ce4a1ad572eecca5be9bdd2a39719d437af1d747
MD5 hash: 9187da2463b077d8e13468a27a4110fb
humanhash: louisiana-potato-iowa-low
File name:Scan_Invoice_12-09#17.msi
Download: download sample
Signature IcedID
File size:843'776 bytes
First seen:2022-12-10 05:16:28 UTC
Last seen:2022-12-10 06:29:05 UTC
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 24576:FHL0q9mTn3Tp9LolK0aID/kJAHCGWPXoPcTPbgrQlRNKIg8gx:Fr0qa3kK0oGWPXoPcTPbgrQlRNKIg8g
Threatray 1'260 similar samples on MalwareBazaar
TLSH T1F5053A13E37210E5D8B6C2398A677627B9F13C2543349BD75710762A4F72BF0AA3A385
TrID 53.7% (.MST) Windows SDK Setup Transform script (61000/1/5)
39.2% (.MSP) Windows Installer Patch (44509/10/5)
7.0% (.) Generic OLE2 / Multistream Compound (8000/1)
Reporter malware_traffic
Tags:BokBot broskabrwaf.com IcedID msi password: u753

Intelligence


File Origin
# of uploads :
3
# of downloads :
150
Origin country :
US US
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed rundll32.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.Heracles
Status:
Malicious
First seen:
2022-12-10 05:17:11 UTC
File Type:
Binary (Archive)
Extracted files:
32
AV detection:
6 of 39 (15.38%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
Modifies data under HKEY_USERS
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Drops file in Windows directory
Enumerates connected drives
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments