MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e0b1c175506c8e56eb9c90c7b96d736e4a60617371f2e41ed5a62e7bc217eca6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: e0b1c175506c8e56eb9c90c7b96d736e4a60617371f2e41ed5a62e7bc217eca6
SHA3-384 hash: 8ad8f235c99c947544245040bb6c0d9b29872ab590cb5f38a27f312db2a3c61dd64bd3bf48c1a92957d60cf79fbab54d
SHA1 hash: d4ba7c4203b17c7ea54def6d4420a837cd1d6f44
MD5 hash: 7f7743ac264b60f113c1db1d96afd616
humanhash: alabama-utah-failed-river
File name:YAeeh.pdf
Download: download sample
Signature IcedID
File size:293'890 bytes
First seen:2020-10-07 21:15:28 UTC
Last seen:2020-10-07 21:57:31 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 6c4861b61e73e158254766955c036e4f (10 x IcedID)
ssdeep 6144:vn2ezOktWfCNv9cvA7Zguu3pJ5BrKa45wz7AOy+LM43CIMc:vrqkUfCNvyI3u3p5A5w7g+L5n
Threatray 99 similar samples on MalwareBazaar
TLSH D6548D11FD82C072E4B206350874ABB147BDB9211FA4CFE763D4196E8E765C0AB36DB6
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
2
# of downloads :
159
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending a custom TCP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Antivirus / Scanner detection for submitted sample
Initial sample is a PE file and has a suspicious name
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 294793 Sample: YAeeh.pdf Startdate: 07/10/2020 Architecture: WINDOWS Score: 52 23 Antivirus / Scanner detection for submitted sample 2->23 25 Initial sample is a PE file and has a suspicious name 2->25 7 AcroRd32.exe 37 2->7         started        process3 process4 9 RdrCEF.exe 45 7->9         started        12 AcroRd32.exe 2 5 7->12         started        dnsIp5 19 192.168.2.1 unknown unknown 9->19 14 RdrCEF.exe 9->14         started        17 RdrCEF.exe 9->17         started        process6 dnsIp7 21 80.0.0.0 NTLGB United Kingdom 14->21
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-10-07 21:17:07 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Blacklisted process makes network request
Unpacked files
SH256 hash:
e0b1c175506c8e56eb9c90c7b96d736e4a60617371f2e41ed5a62e7bc217eca6
MD5 hash:
7f7743ac264b60f113c1db1d96afd616
SHA1 hash:
d4ba7c4203b17c7ea54def6d4420a837cd1d6f44
SH256 hash:
494a763fcf5145e93d024054fc0c5d12b48e0240366022ba1b0d1b9d4fa0e2f8
MD5 hash:
fabe71c4cb9d481bae782330e7715c1b
SHA1 hash:
f3b5beb090f50015a3fc024348e42c214a9bf021
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments