MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ffb08f27fe1710bc42fed4f350c79885d1a176111b9e4fdcc0b077cb2fe983a7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: ffb08f27fe1710bc42fed4f350c79885d1a176111b9e4fdcc0b077cb2fe983a7
SHA3-384 hash: 12c6c55e7a1162f2acb2defb1df1ed6cc911a35ae779d713b4822735c66095b5f5ed3b1f12fc1b8aa9dfe76a5ff2e9b3
SHA1 hash: fff4836b62a272e0519e4915125667a9c0763b2b
MD5 hash: b83aab4515ed7fc26cfcab032852dd34
humanhash: ohio-bakerloo-alabama-cup
File name:2020-07-14-DLL-for-IcedID-installer-example-06-of-18.bin
Download: download sample
Signature IcedID
File size:162'816 bytes
First seen:2020-07-15 08:20:00 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash e8fbd6da0d38f3c7dc051ba3209cd26f (17 x IcedID)
ssdeep 3072:jByDMAeNBXKlc5Sh2Y0ylyCAK0u3q33U3A3ymr+rvo:jBS6BalU2T0PKI3k3An+rvo
Threatray 804 similar samples on MalwareBazaar
TLSH 53F38C05BA40C071D5BE1D384931D7AA0B7D7C30EFD19A8B77C42A6E1EB12D0AD35EA6
Reporter JAMESWT_WT
Tags:dll IcedID IceID

Intelligence


File Origin
# of uploads :
1
# of downloads :
107
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Sending a custom TCP request
Threat name:
Win32.Trojan.IcedID
Status:
Malicious
First seen:
2020-07-15 00:57:43 UTC
File Type:
PE (Dll)
Extracted files:
26
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Modifies system certificate store
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments