MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e2d3e9a7819a89cffc3f614f62d44a8312eccea750e9fb0adac154ff5ea0f5f7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: e2d3e9a7819a89cffc3f614f62d44a8312eccea750e9fb0adac154ff5ea0f5f7
SHA3-384 hash: 613ef65129e7e864b47c1b65c36efd6d11ecb3b0688f177bffc68a0149148f5f8e78b266bbb29a882b2f9d7e9bbe0bd1
SHA1 hash: fe0731f820b46258100c37f49b412be39c976776
MD5 hash: 9a0b04c75d3f64bcd7c59632555f401d
humanhash: carpet-montana-three-four
File name:xuluw1.bin
Download: download sample
Signature IcedID
File size:275'456 bytes
First seen:2020-09-24 00:17:44 UTC
Last seen:2020-09-24 01:02:29 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 31224beb591b9b3dd428df4a82400174 (1 x IcedID)
ssdeep 6144:8JKIHlPW3P3ose/2t4zolRPKMAO13+OnUzhXVx:uKOlyoi4zYRnj3rKVx
Threatray 319 similar samples on MalwareBazaar
TLSH 69449E1179D2C072D5FF1A3404B9D6E60ABDB9314D60CDABB7E40A2E8F761C19E31E62
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
2
# of downloads :
172
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending a custom TCP request
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
60 / 100
Signature
Contains functionality to detect hardware virtualization (CPUID execution measurement)
System process connects to network (likely due to code injection or exploit)
Yara detected IcedID
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.GenMlwB
Status:
Malicious
First seen:
2020-09-24 00:19:06 UTC
AV detection:
18 of 29 (62.07%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments