MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f5f477d945634e37e1abca7c1390e03a7535005c9ff071a191f4d24274bdf075. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 11


Intelligence 11 IOCs 2 YARA 11 File information Comments

SHA256 hash: f5f477d945634e37e1abca7c1390e03a7535005c9ff071a191f4d24274bdf075
SHA3-384 hash: fe1e8f641390a43b7f07d61a8de14296b29b04c091c77f0f217d22a9f46407ad130d87d7a93eb533c0c8bcf03b244582
SHA1 hash: e35e8fdd8e436c6252b4fc40e61e22a11f5b7b06
MD5 hash: aa4fba04592a2b1f7c543caa502e0b65
humanhash: virginia-orange-oklahoma-river
File name:aa4fba04592a2b1f7c543caa502e0b65.exe
Download: download sample
Signature IcedID
File size:6'519'437 bytes
First seen:2021-09-17 17:10:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:yx3mlSMuc2jHO4lrz7XZIo7DJKQKloxIw6srRikzcVugemuO/g6fqb2uskXfzrGU:yhsuceHjrXSwDCOIwrYScVnI6fqFp379
Threatray 556 similar samples on MalwareBazaar
TLSH T15F663360723A4762E506AE74E6D83DAE3CC680F11164D59F37937BAB25200B7CDB3B46
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe IcedID


Avatar
abuse_ch
IcedID C2:
http://179.43.175.24/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://179.43.175.24/ https://threatfox.abuse.ch/ioc/222954/
limerugaf.top https://threatfox.abuse.ch/ioc/223022/

Intelligence


File Origin
# of uploads :
1
# of downloads :
577
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
aa4fba04592a2b1f7c543caa502e0b65.exe
Verdict:
No threats detected
Analysis date:
2021-09-17 17:13:03 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
overlay packed
Result
Threat name:
RedLine Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 485309 Sample: SsQhNS9zks.exe Startdate: 17/09/2021 Architecture: WINDOWS Score: 100 74 179.43.128.2 PLI-ASCH Panama 2->74 76 162.159.134.233 CLOUDFLARENETUS United States 2->76 78 4 other IPs or domains 2->78 96 Antivirus detection for URL or domain 2->96 98 Antivirus detection for dropped file 2->98 100 Multi AV Scanner detection for dropped file 2->100 102 15 other signatures 2->102 10 SsQhNS9zks.exe 10 2->10         started        signatures3 process4 file5 44 C:\Users\user\AppData\...\setup_installer.exe, PE32 10->44 dropped 13 setup_installer.exe 19 10->13         started        process6 file7 46 C:\Users\user\AppData\...\setup_install.exe, PE32 13->46 dropped 48 C:\Users\user\...\Wed06d589834351b.exe, PE32 13->48 dropped 50 C:\Users\user\...\Wed06c0dbf2cc707fc17.exe, PE32 13->50 dropped 52 14 other files (3 malicious) 13->52 dropped 16 setup_install.exe 1 13->16         started        process8 dnsIp9 70 172.67.142.91 CLOUDFLARENETUS United States 16->70 72 127.0.0.1 unknown unknown 16->72 94 Adds a directory exclusion to Windows Defender 16->94 20 cmd.exe 1 16->20         started        22 cmd.exe 16->22         started        24 cmd.exe 1 16->24         started        26 5 other processes 16->26 signatures10 process11 signatures12 29 Wed068235f0e20f.exe 4 70 20->29         started        34 Wed06695253f89add21f.exe 22->34         started        36 Wed06c0dbf2cc707fc17.exe 2 24->36         started        104 Adds a directory exclusion to Windows Defender 26->104 38 Wed0689cde187615488a.exe 26->38         started        40 Wed062e3216008298ca7.exe 2 26->40         started        42 powershell.exe 25 26->42         started        process13 dnsIp14 80 37.0.10.214 WKD-ASIE Netherlands 29->80 82 37.0.10.244 WKD-ASIE Netherlands 29->82 88 11 other IPs or domains 29->88 54 C:\Users\...\vuKlxlYP0t1si8c0IcnislCs.exe, PE32 29->54 dropped 56 C:\Users\...\nL_ZIfUIMVbIVpeVE7EWNGn_.exe, PE32 29->56 dropped 58 C:\Users\...\l103wBjIkCbWBtRWAhQhYkZk.exe, PE32 29->58 dropped 66 41 other files (34 malicious) 29->66 dropped 106 Detected unpacking (creates a PE file in dynamic memory) 29->106 108 Drops PE files to the document folder of the user 29->108 110 Creates HTML files with .exe extension (expired dropper behavior) 29->110 112 Disable Windows Defender real time protection (registry) 29->112 90 2 other IPs or domains 34->90 60 C:\Users\user\AppData\...\softokn3[1].dll, PE32 34->60 dropped 62 C:\Users\user\AppData\...\mozglue[1].dll, PE32 34->62 dropped 64 C:\Users\user\AppData\...\freebl3[1].dll, PE32 34->64 dropped 68 9 other files (none is malicious) 34->68 dropped 114 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 34->114 116 Tries to harvest and steal browser information (history, passwords, etc) 34->116 118 Tries to steal Crypto Currency Wallets 34->118 92 3 other IPs or domains 36->92 120 Detected unpacking (changes PE section rights) 36->120 84 208.95.112.1 TUT-ASUS United States 38->84 86 45.136.151.102 ENZUINC-US Latvia 38->86 122 Tries to detect virtualization through RDTSC time measurements 38->122 124 Injects a PE file into a foreign processes 40->124 file15 signatures16
Threat name:
Win32.Downloader.Zenlod
Status:
Malicious
First seen:
2021-09-15 12:56:28 UTC
AV detection:
22 of 28 (78.57%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:metasploit family:redline family:smokeloader family:socelars family:vidar botnet:706 botnet:937 botnet:ani aspackv2 backdoor dropper evasion infostealer loader stealer suricata themida trojan vmprotect
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Vidar Stealer
Glupteba
Glupteba Payload
MetaSploit
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE Observed Win32/Ymacco.AA36 User-Agent
suricata: ET MALWARE Possible Dridex Download URI Struct with no referer
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Win32/Tnega Activity (GET)
Malware Config
C2 Extraction:
https://dimonbk83.tumblr.com/
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
45.142.215.47:27643
Dropper Extraction:
http://shellloader.com/welcome
Unpacked files
SH256 hash:
c598a971f1d8bc58362396b10df4359654354e6c7b1b56741cea2a532e9bdd94
MD5 hash:
3367116dc59fc2b806bb5ec8c36bf2b6
SHA1 hash:
f4fb01a1efff6c7969383ccf7f64e4ac8cfc2c6f
SH256 hash:
d1417ebebd174d666a6abc9481d65b39fc2d88559f7fd92ebb7e2f1ae93787db
MD5 hash:
70220a3ce6ffd34101b3770342505f2c
SHA1 hash:
b55c421634d8eeaec5c6193f34c04625d21a9ae9
SH256 hash:
36d5afdcb0fa8d512656aa5a59f34018885bb1b9dd5cc0780766552809cfb45f
MD5 hash:
4f9c74430d72b9500a0d99cc28fc7a7e
SHA1 hash:
a67cf6a62a6cabec501aa2f14e97c48b71dbd97c
SH256 hash:
da6e2470414935131c3a094758be78605ec1c1ba8ddc755d175ac73763cc307a
MD5 hash:
03cd7541a32149209ecec14115466bc3
SHA1 hash:
bff67b407cffb1d3f3afbbcee15046e968204af3
SH256 hash:
c16fe3fa7960e24dc1c33753192a7742e5b6a1b5e216e4bc54f1b022b20e0f07
MD5 hash:
ac4786a2dda6a68d150687b1ee0c9e7b
SHA1 hash:
b623c69bf3a449d51340397a604818651acdbd9a
SH256 hash:
e6ee06c6bc0014b73e3d24bd01d4713c661fafe2e321b0013d726c134e8fa6af
MD5 hash:
e20f9039ea3ab837fcc4d9bfb13558cf
SHA1 hash:
a5e4430e463caf539061c49c75bbab9c587d4500
SH256 hash:
8e68ac31757d0a34a40ea5da8a9a4a7200f732bd33a385dfa62dc2d0f1c62ed0
MD5 hash:
67fad7dfb32e40e5f1151da6d9ce3685
SHA1 hash:
9088a2843830b0e0044e3977427fd19ab7da5723
SH256 hash:
ae2341afea7f8ac62cedeb67a7bc87fdbee0ac3c9510d802d6451e5433086e32
MD5 hash:
21a14f7685858930c1c874b1bbb48904
SHA1 hash:
74df13d322ef92fca83c6aa8e153390428c8a91a
SH256 hash:
4c7a7b64424daf89960ff6e71600e7f4ea843b8f7dcd4cabbb88f3c56ca87adb
MD5 hash:
cd2c3a6ec84e2fa6f44015c330b3beff
SHA1 hash:
5504a814e0388f110cd2501ee203d563c1b7700a
SH256 hash:
3b1323f61c21e0a98c558b5efaacda663888940970d10f4df895d41b1c4bdc14
MD5 hash:
863d09b3ce2a9e4c6bc4e2a3354973d1
SHA1 hash:
3f9079bd9faa5e46b2cef582684d85eb81df477d
SH256 hash:
f835356826383f0582443a618500f838833b30cd5d3f02161dbbaafe2f748204
MD5 hash:
584c7f393aefac1ccc8f748b952c6cf1
SHA1 hash:
0e4d980be1e1f6e34a4e8c6bb00d750474d507ef
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
5929d66d843c85a9c0e4885b2c0d9680bc2419bdef291f51462a7fd849878e50
MD5 hash:
6aa3f05d95c2b750b3f7d65a0ff9aae7
SHA1 hash:
4dedba250593bb2921a448df9e638934ada770ff
Detections:
win_socelars_auto
SH256 hash:
80674f1f7d27a9a0ba4942d57d7062e509c7f005577815f2bd44b6323433ca36
MD5 hash:
543ccc1dc073b5487a89d09eb4981b11
SHA1 hash:
990fc962b248e1639f458c0859316fbe8b502512
SH256 hash:
c1ce294ed56ab00f77d5b138f51360106f62b12ad8b6c685587a2c4a45bf7b75
MD5 hash:
7512a2f9f15bad4d6f55520579cf5217
SHA1 hash:
ceabd8b12092b81db0390970e9fd41d6bc6585ac
SH256 hash:
dd6a209863af348624d54d1f14f1066f559223b3208527cea6ff7d02ecef7c11
MD5 hash:
06a8a6e44a4c142bf5bdcf71f38b1b79
SHA1 hash:
62fd773bd1597f4fdf54b51946de72c34b9cac0a
SH256 hash:
615cde3d98777470c2b3078f1340140fb739142c2236fc4928758e064f87cd00
MD5 hash:
96620d39321d1a9c8fe80ed7d764bf57
SHA1 hash:
b9797881abc9c1d3505a6408a35993931620c8bb
SH256 hash:
f5f477d945634e37e1abca7c1390e03a7535005c9ff071a191f4d24274bdf075
MD5 hash:
aa4fba04592a2b1f7c543caa502e0b65
SHA1 hash:
e35e8fdd8e436c6252b4fc40e61e22a11f5b7b06
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:SUSP_XORed_Mozilla_RID2DB4
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments