MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1b719ce08de027c58ea2b699753a9189337f1b80f78c342f9f02dee8a8ef6f84. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry

Intelligence 2 File information 3 Yara 2 Comments

SHA256 hash: 1b719ce08de027c58ea2b699753a9189337f1b80f78c342f9f02dee8a8ef6f84
SHA3-384 hash: edcd39480b6c3461a70f76bf8bbe262f2217fb4ca0b2615c2997491b5cb2b307d54729b9eb8dc185b55afb18da1357c1
SHA1 hash: edd85c3426323f9b501b93ccbc9db26b5dc3bc98
MD5 hash: 4ff01f434fc4e749b6849f8f91df592e
humanhash: network-glucose-quiet-april
File name:Services-pricelist.xls
Download: download sample
Signature TrickBot
File size:81'925 bytes
First seen:2020-06-29 18:21:37 UTC
Last seen:Never
File type:Excel file xls
MIME type:application/
ssdeep 1536:Rk3hOdsylKlgryzc4bNhZFGzE+cL4LgldA/n/IpoYTQxgS:Rk3hOdsylKlgryzc4bNhZFGzE+cL4Lgu
TLSH 2183B8E2FB95EA24DAD5C7359F1B42E01722FC01161E5B9BA2C1B239BF7D1709E0D091
Reporter @abuse_ch
Tags:TrickBot xls

Malspam distributing TrickBot:

Sending IP:
From: Riddlectronics <>
Subject: Products and solutions prices
Attachment: Services-pricelist.xls

TrickBot payload URL:


Mail intelligence
Trap location Impact
Global Low
# of uploads 1
# of downloads 36
Origin country US US
ClamAV TwinWave.EvilDoc.Excel4SetNameBangYourHead.20200628.UNOFFICIAL
CERT.PL MWDB Detection:n/a
ReversingLabs :Status:Malicious
Threat name:Document-Word.Trojan.Sload
First seen:2020-06-29 18:23:03 UTC
AV detection:9 of 48 (18.75%)
Threat level:   2/5
Spamhaus Hash Blocklist :Suspicious file
Hatching Triage Score:   1/10
Malware Family:n/a
VirusTotal:No data

Yara Signatures

Rule name:SharedStrings
Author:Katie Kleemola
Description:Internal names found in LURK0/CCTV0 samples
Rule name:SUSP_EnableContent_String_Gen
Author:Florian Roth
Description:Detects suspicious string that asks to enable active content in Office Doc
Reference:Internal Research

File information

The table below shows additional information about this malware sample such as delivery method and external references.



Excel file xls 1b719ce08de027c58ea2b699753a9189337f1b80f78c342f9f02dee8a8ef6f84

(this sample)

Delivery method
Distributed via e-mail attachment