MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 128857fbdd03544bfad4bdbf0c495e1c2a3dc0f5d440a9bf2ac62b26f4b63535. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 128857fbdd03544bfad4bdbf0c495e1c2a3dc0f5d440a9bf2ac62b26f4b63535
SHA3-384 hash: 4108ae9950a8881ee3d28f4b939b211aac2f44058f1dea9991f1095711fa8c8166e2ddaa77328d304669b268750d1f16
SHA1 hash: 1485cf607a47aa95314ebcf9abe28a139b6dd6b7
MD5 hash: d74e3923ccff9ea11b822bd7219419cd
humanhash: winter-comet-nuts-oklahoma
File name:128857fbdd03544bfad4bdbf0c495e1c2a3dc0f5d440a9bf2ac62b26f4b63535
Download: download sample
Signature TrickBot
File size:442'368 bytes
First seen:2020-11-07 17:38:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 98d311d66ae2680773696ba930c5faa5 (9 x TrickBot)
ssdeep 6144:67qyvb45g/wJ5CwkriASOiEHIMn0/J6W2pH12WiwM:hyzn+0wtASOI/J6W6H15iwM
Threatray 2'922 similar samples on MalwareBazaar
TLSH 4E94AE157141C87BC23504B2DCF856BBF670FE482BB0698B63C46E389D71B91E936627
Reporter seifreed
Tags:TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
106
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Connection attempt
Unauthorized injection to a system process
Connection attempt to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Emotet
Status:
Malicious
First seen:
2020-11-07 17:44:58 UTC
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:lib794 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Trickbot
Malware Config
C2 Extraction:
95.171.16.42:443
185.90.61.9:443
5.1.81.68:443
185.99.2.65:443
134.119.191.11:443
85.204.116.100:443
78.108.216.47:443
51.81.112.144:443
194.5.250.121:443
185.14.31.104:443
185.99.2.66:443
107.175.72.141:443
192.3.247.123:443
134.119.191.21:443
85.204.116.216:443
91.235.129.20:443
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
110.93.15.98:449
80.210.32.67:449
103.111.83.246:449
200.107.35.154:449
36.89.182.225:449
36.89.243.241:449
36.92.19.205:449
110.50.84.5:449
182.253.113.67:449
36.66.218.117:449
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments