MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 05b662e6e0ee03a3e2b87b14fcda6e28f8e048b62f5baeb698068b85d83b1181. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 05b662e6e0ee03a3e2b87b14fcda6e28f8e048b62f5baeb698068b85d83b1181
SHA3-384 hash: a6165496ea1287cb1e73b3abaa45a5c677e23ddcfc22a78e6d5d9c3fceedb3c3af922a414274ef5036273a7640ba9085
SHA1 hash: df702fd14a252c21a796c3a4e21621b6b842faea
MD5 hash: a6b58263ee465da7376c391873bd1138
humanhash: network-golf-mike-twenty
File name:DACMAZY.exe
Download: download sample
Signature TrickBot
File size:445'440 bytes
First seen:2020-09-09 12:26:18 UTC
Last seen:2020-09-09 14:59:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 84a169de23f86c3d1f132f5c4dd7d1b7 (1 x TrickBot)
ssdeep 6144:beS2un66qVfCDl1MjHfsOu7ubO9vs1sh8tnAQ/g0ANa24NuB5WczTLZaYh:qS2un6tVycEOu7ubOmiSFBrAX55Tlao
Threatray 2'834 similar samples on MalwareBazaar
TLSH 5B94D012F2E18076C462017508BEAF6A157DFD765B2041CB33A9FABE0DF12D165B6B23
Reporter James_inthe_box
Tags:exe TrickBot

Intelligence


File Origin
# of uploads :
2
# of downloads :
263
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Launching a process
Unauthorized injection to a system process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.TrickBot
Status:
Malicious
First seen:
2020-09-09 10:58:15 UTC
File Type:
PE (Exe)
Extracted files:
57
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
trojan banker family:trickbot
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Trickbot
Malware Config
C2 Extraction:
51.89.177.20:443
194.5.249.174:443
107.174.196.242:443
185.205.209.241:443
82.146.46.220:443
5.34.178.126:443
212.22.70.65:443
195.123.241.90:443
185.164.32.214:443
198.46.198.139:443
195.123.241.187:443
86.104.194.116:443
195.123.240.252:443
185.164.32.215:443
45.148.120.195:443
45.138.158.32:443
5.149.253.99:443
92.62.65.163:449
88.247.212.56:449
180.211.170.214:449
186.159.8.218:449
158.181.155.153:449
27.147.173.227:449
103.130.114.106:449
103.221.254.102:449
187.109.119.99:449
220.247.174.12:449
183.81.154.113:449
121.101.185.130:449
200.116.159.183:449
200.116.232.186:449
103.87.169.150:449
180.211.95.14:449
103.36.48.103:449
45.127.222.8:449
112.109.19.178:449
36.94.33.102:449
110.232.249.13:449
177.190.69.162:449
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments