MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cbe3062225faebf38b5f05aad6ebaddadccf5a41fda7e075d8264b2df7d66150. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: cbe3062225faebf38b5f05aad6ebaddadccf5a41fda7e075d8264b2df7d66150
SHA3-384 hash: 945284fb68e3963479701e63e3dd27de63137acb7bc479bddb5cdf7239ea9546caf43132253e720eabab5cce98ef39b9
SHA1 hash: 96515ee02bc111c5851ec05398438209e9379e0e
MD5 hash: f03f53626a3cd9862a7ead15ac28b666
humanhash: snake-delaware-sink-mexico
File name:preview.jpg
Download: download sample
Signature IcedID
File size:172'034 bytes
First seen:2020-08-13 21:18:45 UTC
Last seen:2020-08-13 21:43:43 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 7dba58da61785bfb99de571c94414d2d (12 x IcedID, 2 x Gozi)
ssdeep 1536:hF+KOaaJzE/2b3RDdJQ5ZU5m/Yzs/8OXmlWRnuZtH2WY8+pt6PytN8bUMWfy:hF6JAkhR2SsfmTtH/+poPANjTfy
Threatray 567 similar samples on MalwareBazaar
TLSH 0AF37D113AE28071F267063E8260CA51CF7D39537ABED78FA7D4079EE9639805B313A5
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
2
# of downloads :
164
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending a custom TCP request
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
60 / 100
Signature
Contains functionality to detect hardware virtualization (CPUID execution measurement)
System process connects to network (likely due to code injection or exploit)
Yara detected IcedID
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 266409 Sample: preview.jpg Startdate: 15/08/2020 Architecture: WINDOWS Score: 60 19 www.oracle.com 2->19 35 Yara detected IcedID 2->35 7 loaddll32.exe 1 2->7         started        signatures3 process4 process5 9 rundll32.exe 7->9         started        13 rundll32.exe 7->13         started        15 rundll32.exe 7->15         started        17 rundll32.exe 7->17         started        dnsIp6 21 s.twitter.com 104.244.42.67, 443, 49764 TWITTERUS United States 9->21 23 www.oracle.com 9->23 29 6 other IPs or domains 9->29 37 System process connects to network (likely due to code injection or exploit) 9->37 39 Contains functionality to detect hardware virtualization (CPUID execution measurement) 9->39 25 www.oracle.com 13->25 27 support.oracle.com 13->27 31 2 other IPs or domains 15->31 33 2 other IPs or domains 17->33 signatures7
Threat name:
Win32.Ransomware.WannaCry
Status:
Malicious
First seen:
2020-08-13 21:20:07 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments