MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e4f0a9d751979779844dbfa667cf901b1d297f986201870d365fadb3eea3d451. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: e4f0a9d751979779844dbfa667cf901b1d297f986201870d365fadb3eea3d451
SHA3-384 hash: 0db57580e47a2a212106b754fcfba646e24649bebe69d9fe61f00fd19c433b5506bc67b69621bc8383f2e9687dc5f4e3
SHA1 hash: dfcd9d67e66dc9cd0f59b37858caeb11e08f88aa
MD5 hash: 1b4a2c8c5fd4b3d3d5ac502efc6886ae
humanhash: fanta-whiskey-edward-salami
File name:iceix_1.1.6.0.vir
Download: download sample
Signature ZeuS
File size:217'600 bytes
First seen:2020-07-19 19:40:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash edf8e3c62bca9eded8fd1b8fd511e3b6
ssdeep 6144:pX9KH9abFj5BdqjRmU9jhUvuRIoyWlmhtU:dYqBgjRnhyuqm
TLSH 8124E1C1C797DD09E5D3C0723A21E77280987C348415D413B3C6AF66723A2EDA8A6F6B
Reporter @tildedennis
Tags:iceix ZeuS


Twitter
@tildedennis
iceix version 1.1.6.0

Intelligence


File Origin
# of uploads :
1
# of downloads :
19
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Connection attempt to an infection source
Threat name:
Win32.Trojan.Kryptk
Status:
Malicious
First seen:
2011-10-31 16:55:00 UTC
AV detection:
29 of 31 (93.55%)
Threat level
  2/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Deletes itself
Executes dropped EXE
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments