MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 852df49eddcced4bfeb403ef5705c9c559e72999f0830447e7c9d51d8437a4e0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 852df49eddcced4bfeb403ef5705c9c559e72999f0830447e7c9d51d8437a4e0
SHA3-384 hash: 449c94e8170062b14e688ce77ac04135be294b6e90dfd5881bc9df49a4eb5d2c4af0a2c9777f9ed1ebe0f8b2db1b6996
SHA1 hash: d67dade16a6302c02845c750d570716dd887dac3
MD5 hash: 83fb9b3ce69bb443ba223dd6618e62a0
humanhash: lake-wisconsin-emma-bakerloo
File name:update.dll
Download: download sample
Signature TrickBot
File size:704'000 bytes
First seen:2020-07-09 19:00:20 UTC
Last seen:2020-07-09 19:58:46 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 6f3625a7f599791522d77ef696487a40 (3 x TrickBot)
ssdeep 12288:hcm8hkw56GHhTGgDo4ugUcfmN+/tRbcDyyaIJekGB:hc15cihTGfMU/+/tRbcMRrB
Threatray 5'192 similar samples on MalwareBazaar
TLSH A5E4BF21B6C4C031D8FA0172BB686B12157DBD744B3F9ECF6BD5188A5AF45C26239B23
Reporter abuse_ch
Tags:chil63 dll GBR geo TrickBot


Avatar
abuse_ch
Malspam distributing TrickBot:

HELO: chameleon.elm.relay.mailchannels.net
Sending IP: 23.83.212.33
From: Rabbit Systems <jade@jensenprecision.com>
Subject: Past due recent invoice reminder
Attachment: account_invoice_5918.xls

TrickBot payload URL:
http://185.14.31.93/34fhjdgEN3rE5ff.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
127
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Unauthorized injection to a system process
Threat name:
Win32.Trojan.TrickBot
Status:
Malicious
First seen:
2020-07-09 19:02:03 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
trojan banker family:trickbot
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Templ.dll packer
Trickbot
Malware Config
C2 Extraction:
95.171.16.42:443
185.90.61.9:443
5.1.81.68:443
185.99.2.65:443
134.119.191.11:443
85.204.116.100:443
78.108.216.47:443
51.81.112.144:443
194.5.250.121:443
185.14.31.104:443
185.99.2.66:443
107.175.72.141:443
192.3.247.123:443
134.119.191.21:443
85.204.116.216:443
91.235.129.20:443
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
110.93.15.98:449
80.210.32.67:449
103.111.83.246:449
200.107.35.154:449
36.89.182.225:449
36.89.243.241:449
36.92.19.205:449
110.50.84.5:449
182.253.113.67:449
36.66.218.117:449
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

TrickBot

DLL dll 852df49eddcced4bfeb403ef5705c9c559e72999f0830447e7c9d51d8437a4e0

(this sample)

Comments