MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0b149fc1f48da1d2c02d778be120427483403cd7519fc7f69e741288b120cb9d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 9


Maldoc score: 7


Intelligence 9 IOCs YARA 2 File information Comments

SHA256 hash: 0b149fc1f48da1d2c02d778be120427483403cd7519fc7f69e741288b120cb9d
SHA3-384 hash: 455f93200d548c3c0919045557458227a7958673373c258e330ac732538068185aa88ea2efd13dab6dec12497e8c8693
SHA1 hash: c4cee812f0fb97c510e149a28c1a55b6c5da2c9e
MD5 hash: 7ac2366ab4515b9f37be3187deea9bc0
humanhash: football-undress-sweet-quiet
File name:RNP-00152.xlsm
Download: download sample
Signature TrickBot
File size:89'298 bytes
First seen:2021-10-21 15:11:23 UTC
Last seen:Never
File type:Excel file xlsm
MIME type:application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
ssdeep 1536:SIomTUHtu+RQ+gX5YtCSxnGUEgRwLiteKnOfhMycRfCFqbX38K7qdgX03Vkmq6:dowUNzQ+gNSxGJgRwmt+ZKZn+dfVy6
TLSH T10993DFE9B50765ABC625303DB3480EFAD19C4653BBD8E6253C68DE4407AE627039F0F6
Reporter info_sec_ca
Tags:TrickBot xlsm

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 7
OLE dump

MalwareBazaar was able to identify 13 sections in this file using oledump:

Section IDSection sizeSection name
A1632 bytesPROJECT
A283 bytesPROJECTwm
A34247 bytesVBA/_VBA_PROJECT
A41817 bytesVBA/__SRP_0
A5208 bytesVBA/__SRP_1
A6520 bytesVBA/__SRP_2
A7509 bytesVBA/__SRP_3
A8828 bytesVBA/dir
A9976 bytesVBA/1
A10976 bytesVBA/2
A11976 bytesVBA/3
A1211067 bytesVBA/
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
AutoExecWorkbook_OpenRuns when the Excel Workbook is opened
SuspiciousShellMay run an executable file or a system command
SuspiciousChrWMay attempt to obfuscate specific strings (use option --deobf to deobfuscate)
SuspiciousHex StringsHex-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)

Intelligence


File Origin
# of uploads :
1
# of downloads :
342
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malicious
File Type:
Excel File with Macro
Document image
Document image
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
macros macros-on-open
Result
Verdict:
MALICIOUS
Details
Chunked Suspicious Strings
Detected seemingly chunked sensitive strings. High likely hood of obfuscated malintent.
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Macro Execution Coercion
Detected a document that appears to social engineer the user into activating embedded logic.
Macro Contains Suspicious String
Detected a macro with a suspicious string. Suspicious strings include privileged function calls, obfuscations, odd registry keys, etc...
Base64 Encoded URL
Detected an ANSI or UNICODE http:// or https:// base64 encoded URL prefix.
Document With Minimal Content
Document contains less than 1 kilobyte of semantic information.
Result
Threat name:
TrickBot
Detection:
malicious
Classification:
expl.evad.troj
Score:
100 / 100
Signature
Allocates memory in foreign processes
Delayed program exit found
Document exploit detected (process start blacklist hit)
Encrypted powershell cmdline option found
Found detection on Joe Sandbox Cloud Basic with higher score
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found malware configuration
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Powershell drops PE file
Sigma detected: Microsoft Office Product Spawning Windows Shell
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected Trickbot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 507110 Sample: RNP-00152.xlsm Startdate: 21/10/2021 Architecture: WINDOWS Score: 100 34 Found malware configuration 2->34 36 Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros) 2->36 38 Yara detected Trickbot 2->38 40 3 other signatures 2->40 8 EXCEL.EXE 162 25 2->8         started        process3 file4 30 C:\Users\user\Desktop\~$RNP-00152.xlsm, data 8->30 dropped 11 cmd.exe 1 8->11         started        process5 signatures6 46 Encrypted powershell cmdline option found 11->46 14 rundll32.exe 11->14         started        17 powershell.exe 15 17 11->17         started        21 conhost.exe 11->21         started        process7 dnsIp8 48 Writes to foreign memory regions 14->48 50 Allocates memory in foreign processes 14->50 52 Delayed program exit found 14->52 23 wermgr.exe 14->23         started        26 cmd.exe 14->26         started        32 45.86.65.197, 49759, 80 DEDIPATH-LLCUS France 17->32 28 C:\ProgramData\clb.dll, PE32 17->28 dropped 54 Powershell drops PE file 17->54 file9 signatures10 process11 signatures12 42 Tries to detect virtualization through RDTSC time measurements 23->42 44 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 23->44
Threat name:
Document.Trojan.Heuristic
Status:
Malicious
First seen:
2021-10-21 15:12:06 UTC
AV detection:
2 of 38 (5.26%)
Threat level:
  2/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:rob136 banker macro trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
Loads dropped DLL
Blocklisted process makes network request
Downloads MZ/PE file
Process spawned unexpected child process
Trickbot
Malware Config
C2 Extraction:
65.152.201.203:443
185.56.175.122:443
46.99.175.217:443
179.189.229.254:443
46.99.175.149:443
181.129.167.82:443
216.166.148.187:443
46.99.188.223:443
128.201.76.252:443
62.99.79.77:443
60.51.47.65:443
24.162.214.166:443
45.36.99.184:443
97.83.40.67:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_Dridex_xlsm_20200528_2
Author:abuse.ch
Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments