MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d47cf4ec1a51c17befc01722d5ff603cfbd338ccff442669e765bf8dc20c6b54. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: d47cf4ec1a51c17befc01722d5ff603cfbd338ccff442669e765bf8dc20c6b54
SHA3-384 hash: fadf9338e8980acc91a470efddeca9b80976e4cfcb1fa888dedcf9f6877e7bf04f01181c870f8186e592b13a5568e928
SHA1 hash: 444fb10b133c7e6fdbaee237a8aff1eea48ee863
MD5 hash: d956e9fb1f92771fdfdc35be7c45ba6c
humanhash: failed-juliet-cola-failed
File name:mGhdt.pdf
Download: download sample
Signature IcedID
File size:245'760 bytes
First seen:2020-11-24 22:42:21 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 0bce35d6079bdabe8ebf4ef0830555c9 (2 x IcedID)
ssdeep 6144:GpHWgWOOHnlNSY2mptctqLLjfv/ABDvwrXgQ7B:GFWgAn52vq/jHEYrXgq
Threatray 983 similar samples on MalwareBazaar
TLSH 4234D01333D94476F8B7423944368A61977BB6120B38CC8F76E9168D4AB37E16B3178B
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
1
# of downloads :
174
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Initial sample is a PE file and has a suspicious name
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 322342 Sample: mGhdt.pdf Startdate: 24/11/2020 Architecture: WINDOWS Score: 52 23 Multi AV Scanner detection for submitted file 2->23 25 Initial sample is a PE file and has a suspicious name 2->25 7 AcroRd32.exe 37 2->7         started        process3 process4 9 RdrCEF.exe 44 7->9         started        12 AcroRd32.exe 2 5 7->12         started        dnsIp5 19 192.168.2.1 unknown unknown 9->19 14 RdrCEF.exe 9->14         started        17 RdrCEF.exe 9->17         started        process6 dnsIp7 21 80.0.0.0 NTLGB United Kingdom 14->21
Threat name:
Win32.Trojan.IcedID
Status:
Malicious
First seen:
2020-11-24 22:43:04 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
d47cf4ec1a51c17befc01722d5ff603cfbd338ccff442669e765bf8dc20c6b54
MD5 hash:
d956e9fb1f92771fdfdc35be7c45ba6c
SHA1 hash:
444fb10b133c7e6fdbaee237a8aff1eea48ee863
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments