MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d67e1fd5d40e841c1aedbbf65d5f72a69da5ac54e48ae92da1f428c9f18d8363. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: d67e1fd5d40e841c1aedbbf65d5f72a69da5ac54e48ae92da1f428c9f18d8363
SHA3-384 hash: 9095fc48c4d2501d7f42750e4ff559acda92ffc6d47325f8786c5b0de7ab3bd5749dfd1fe32b2e696a2e47d5de143d27
SHA1 hash: b1c3ec138e2f104bac76852bf0d2bb4708e67922
MD5 hash: 7de2125eba63b36cdc4f45b008a4118b
humanhash: cardinal-juliet-jig-cola
File name:edcf3.pdf
Download: download sample
Signature IcedID
File size:216'578 bytes
First seen:2020-09-17 19:54:03 UTC
Last seen:2020-09-17 20:40:59 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash d26d819c9035c795a5bbe4bce9b3d935 (12 x IcedID)
ssdeep 6144:6ZLwQyyWMa3NIBkL6LDW8dTZdw702edvxiuYOO6umz4N:6ZLwQyyHadIBkLIi8dTL2SvguYOO1mkN
Threatray 121 similar samples on MalwareBazaar
TLSH 9124AE117940C0B2D1EE1A385478DABA427DB9644FF588EFA7D8073E5E342C26B34E67
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
2
# of downloads :
167
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
DNS request
Sending a custom TCP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Initial sample is a PE file and has a suspicious name
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 287177 Sample: edcf3.pdf Startdate: 17/09/2020 Architecture: WINDOWS Score: 52 23 Multi AV Scanner detection for submitted file 2->23 25 Initial sample is a PE file and has a suspicious name 2->25 7 AcroRd32.exe 37 2->7         started        process3 process4 9 RdrCEF.exe 45 7->9         started        12 AcroRd32.exe 2 5 7->12         started        dnsIp5 19 192.168.2.1 unknown unknown 9->19 14 RdrCEF.exe 9->14         started        17 RdrCEF.exe 9->17         started        process6 dnsIp7 21 80.0.0.0 NTLGB United Kingdom 14->21
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-09-17 19:55:06 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments