MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1866bd30067075e02711e616ea58ea560cb73fd1eab910a07f7ad3728110c54d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA 1 File information Comments

SHA256 hash: 1866bd30067075e02711e616ea58ea560cb73fd1eab910a07f7ad3728110c54d
SHA3-384 hash: 7554203470f8ce4ef2c9dd0e28b756b6346cea08eeba87776e9fdd05568b72467cb323c48ed105928836c752efa421fe
SHA1 hash: 03d7ab7f63d45c5684093777453db3757a25f4c6
MD5 hash: 5be5db117cfd82fd092753970848cefa
humanhash: bacon-six-queen-rugby
File name:SecuriteInfo.com.Trojan.GenericKD.34294574.29861.5345
Download: download sample
File size:553'472 bytes
First seen:2020-08-10 08:55:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 8d45050c398215dccb435a5f3813e0c3
ssdeep 12288:b+NLV0b0PkpPlRRZw9Zo86/8uuVG3tUJWlkoqd5E4V/:bd0PkpPbRWHK12JWqq4V/
Threatray 26 similar samples on MalwareBazaar
TLSH 72C4AE47B6A48DB1E877D23ACA93874ADA737C204731D3CB1250971E6E336E15E3A721
Reporter SecuriteInfoCom

Intelligence


File Origin
# of uploads :
1
# of downloads :
55
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Transferring files using the Background Intelligent Transfer Service (BITS)
DNS request
Sending a custom TCP request
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw.evad
Score:
80 / 100
Signature
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Keylogger Generic
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.TrickBot
Status:
Malicious
First seen:
2020-08-05 01:28:39 UTC
AV detection:
19 of 29 (65.52%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_uroburos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 1866bd30067075e02711e616ea58ea560cb73fd1eab910a07f7ad3728110c54d

(this sample)

  
Delivery method
Distributed via web download

Comments