MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e3be616e258172d4596cd61cbb6ec39b6e7aa0cf8138793783e21a4b6ab4c038. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: e3be616e258172d4596cd61cbb6ec39b6e7aa0cf8138793783e21a4b6ab4c038
SHA3-384 hash: 0cd8ce80965969c278e4b77fab84bace5adfa7360e042835e1adaaffab3ed1c83b1fec204c5079eb4ce276f28aa4bf5c
SHA1 hash: 85422e7ee2df1819ccfcac5d87c6ce7a5f21192f
MD5 hash: 46e8a961f876b2ef8b9d0d392fac5119
humanhash: friend-king-mirror-black
File name:~515828.exe
Download: download sample
Signature IcedID
File size:577'024 bytes
First seen:2020-08-17 16:10:51 UTC
Last seen:2020-08-17 16:52:40 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9942fa11701c0d0e5984ab099ace8dcc (1 x IcedID)
ssdeep 12288:hF0If2nKfaT+1YTP7dRyuGgmz96A/ltYuoRzlk84:H0A2KcIYTP7dRyuGz9tcy8
Threatray 20 similar samples on MalwareBazaar
TLSH 2DC44C00A7508139D9FB35F80ABE622D672DBED11B2091C752C416FE9F29AE17D3538B
Reporter malware_traffic
Tags:exe IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
2
# of downloads :
168
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending a custom TCP request
Connection attempt
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
64 / 100
Signature
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Tries to detect virtualization through RDTSC time measurements
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.IcedID
Status:
Malicious
First seen:
2020-08-17 16:12:06 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Discovers systems in the same network
Gathers network information
Gathers system information
Modifies registry class
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Deletes itself
Loads dropped DLL
Reads user/profile data of web browsers
Deletes itself
Loads dropped DLL
Reads user/profile data of web browsers
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments