MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ee9d161ad1be9aeccee4c296424fe65c6cbe29b0cc3b3e3ac1b917a4601e7dd4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: ee9d161ad1be9aeccee4c296424fe65c6cbe29b0cc3b3e3ac1b917a4601e7dd4
SHA3-384 hash: a5de172d4d3528ab074ef1209eeeec22c800e4f5ce861b7250a112300a084e3c76c33e62b741bbf84998413f535c8e77
SHA1 hash: cf2bd68cace52c0d161cd77153193025b0e64a7f
MD5 hash: ff54e46e00903e5713471cbdfd759361
humanhash: iowa-sixteen-red-burger
File name:temp.tmp
Download: download sample
Signature IcedID
File size:817'968 bytes
First seen:2020-10-15 01:30:14 UTC
Last seen:2020-10-16 11:14:30 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 27fa0d2dba6ccd1d6519fd10a6c89402 (2 x IcedID)
ssdeep 6144:3UWobe4FY2BtEg6Zfw2jkq9QiEbwKqNTH7oAu/1EAOgfg8ZdO9/qR+:kBe47tdwfw2jlQGKqNPoAudEp8nO9s+
Threatray 502 similar samples on MalwareBazaar
TLSH EB0562A0FB319574F8A781794936D9321717BE559F6428CF008A366EDA223F294F2D0F
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
4
# of downloads :
136
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Found potential dummy code loops (likely to delay analysis)
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.IcedID
Status:
Malicious
First seen:
2020-10-15 01:32:06 UTC
File Type:
PE (Dll)
Extracted files:
13
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
trojan banker family:icedid
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Blacklisted process makes network request
IcedID, BokBot
Unpacked files
SH256 hash:
ee9d161ad1be9aeccee4c296424fe65c6cbe29b0cc3b3e3ac1b917a4601e7dd4
MD5 hash:
ff54e46e00903e5713471cbdfd759361
SHA1 hash:
cf2bd68cace52c0d161cd77153193025b0e64a7f
SH256 hash:
422b749eb814d3c3d614dfabd7ab1343159c3ea0a0278f05432b4232fb53dbd4
MD5 hash:
9766ce1a997bc0e5612567e3f0d4f4e5
SHA1 hash:
7920328402fb02dbdaa41063709e6a9f4ae8140b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments