MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e4f110ace5cc6e58d8959e08fe6d7680e78e653e9e4c1da80e9770e1acf63ac2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: e4f110ace5cc6e58d8959e08fe6d7680e78e653e9e4c1da80e9770e1acf63ac2
SHA3-384 hash: c9b7502a1559703a5a2ecbab6bc0172abda7ed97673ac6a8ed68f4d7da1aac08a0a25607530c74584298e8929428aa16
SHA1 hash: 06f7be9dbee777d8111c88686cc644fb2bf9b22a
MD5 hash: 8d3ae23b223e2199ede13e576d5947c4
humanhash: queen-sad-golf-oxygen
File name:IcedID (7)
Download: download sample
Signature IcedID
File size:217'088 bytes
First seen:2020-07-17 07:29:27 UTC
Last seen:2020-07-17 08:41:00 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 80ca2c5362a68a115d6f4de4af40c99e (1 x IcedID)
ssdeep 3072:qTPu2H2fVvVd08IpwZhLaZjVQ+KA9xhzWS+aYHm7xLexmPmNECL13KDyW93:gvH29sfZjiiWSmyYimNGd9
Threatray 890 similar samples on MalwareBazaar
TLSH A0249D017A84D071D5BF02391A34E62447BEBC718FB1DA8BBBC44E4F2B79181A625B77
Reporter JAMESWT_WT
Tags:IcedID

Intelligence


File Origin
# of uploads :
2
# of downloads :
101
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
A
b
c
d
e
f
i
l
M
n
o
r
S
t
u
V
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.IcedID
Status:
Malicious
First seen:
2020-07-17 07:31:04 UTC
File Type:
PE (Dll)
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies system certificate store
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments