MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e70e28b0f0fd9ca707dcc37e2ef5e28f81d3f8fb27892f80a92f7f3093df1869. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 6


Intelligence 6 IOCs YARA 3 File information Comments

SHA256 hash: e70e28b0f0fd9ca707dcc37e2ef5e28f81d3f8fb27892f80a92f7f3093df1869
SHA3-384 hash: f02cdf55e37815a0fa658488265ee1bcf5a9bddca7d6368f904b79cadfbabc85bb987519c6047857cab01eb3ad5fd5b4
SHA1 hash: a8ab1d2d52728645982ce74506c7b1f3d2cede0a
MD5 hash: 2e6fd64466ba1383dcb34e4a5fbfd758
humanhash: five-spaghetti-friend-white
File name:~496078.exe
Download: download sample
Signature IcedID
File size:282'624 bytes
First seen:2020-09-14 16:27:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 724da8aaabe1380fe2651f0051c2deac (2 x IcedID)
ssdeep 3072:SOoHlm32akQAoRWyxSF5Um0sMlW1sgg3JDVdopKXYdKCDRttcmOnqG6e+ojw5uSs:TMmAognWm0JlWOggPBcc6Fuvnu6
Threatray 27 similar samples on MalwareBazaar
TLSH A054AE1237F1C873D6A711328DE29BFBB2B5FD604E318B472391AB1EED314919926361
Reporter malware_traffic
Tags:exe IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
1
# of downloads :
138
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
DNS request
Sending a custom TCP request
Connection attempt
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
80 / 100
Signature
Allocates memory in foreign processes
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Contains VNC / remote desktop functionality (version string found)
Early bird code injection technique detected
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.EmotetCrypt
Status:
Malicious
First seen:
2020-09-14 16:29:04 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of SetWindowsHookEx
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Cobalt_functions
Author:@j0sm1
Description:Detect functions coded with ROR edi,D; Detect CobaltStrike used by differents groups APT
Rule name:crime_win32_banker_iceid_ldr1
Author:@VK_Intel
Description:Detects IcedId/BokBot png loader (unpacked)
Reference:twitter
Rule name:win_sisfader_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments