MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 18a3ed7a253f8e074805bfedc4cf6aab316ce4909913e2dc8aedbc19fce668ca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
TrickBot
Vendor detections: 9
| SHA256 hash: | 18a3ed7a253f8e074805bfedc4cf6aab316ce4909913e2dc8aedbc19fce668ca |
|---|---|
| SHA3-384 hash: | 72768160981dbed0f7a2ed8134fa843b619873696d138ec6df527acbd34e154627fa260c7b863c182d448329d1284756 |
| SHA1 hash: | dee40cdb15046a6a1f47445b6202034e9a0d77e6 |
| MD5 hash: | 46ea0661444ba5f0c09c59938883fcaa |
| humanhash: | salami-stream-nitrogen-lion |
| File name: | 138.dll |
| Download: | download sample |
| Signature | TrickBot |
| File size: | 691'200 bytes |
| First seen: | 2021-03-15 15:40:59 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | cae73998be5b008dd1c2d777a562de39 (3 x TrickBot) |
| ssdeep | 12288:FFq5gJqjDe8jUCYPnXjX/5n85pFb85xFYFEQCoS6or9cOCeWGj2:j0+jXBnApFox2FFCtr/16 |
| TLSH | 1CE4AE1176E0C071C16E36705416A7B856ADF8E06F7D87CB6BD42A3F6F312C29A3835A |
| Reporter | |
| Tags: | dll TrickBot |
Intelligence
File Origin
# of uploads :
1
# of downloads :
230
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
Clean
Maliciousness:
Behaviour
Sending a UDP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
TrickBot
Verdict:
Malicious
Result
Threat name:
TrickBot
Detection:
malicious
Classification:
troj
Score:
56 / 100
Signature
Multi AV Scanner detection for submitted file
Yara detected Trickbot
Behaviour
Behavior Graph:
Detection:
trickbot
Threat name:
Win32.Infostealer.Trickster
Status:
Malicious
First seen:
2021-03-15 15:40:33 UTC
File Type:
PE (Dll)
Extracted files:
43
AV detection:
10 of 28 (35.71%)
Threat level:
5/5
Verdict:
malicious
Result
Malware family:
trickbot
Score:
10/10
Tags:
family:trickbot botnet:mon138 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Templ.dll packer
Trickbot
Malware Config
C2 Extraction:
103.225.138.94:449
122.2.28.70:449
123.200.26.246:449
131.255.106.152:449
142.112.79.223:449
154.126.176.30:449
180.92.238.186:449
187.20.217.129:449
201.20.118.122:449
202.91.41.138:449
95.210.118.90:449
122.2.28.70:449
123.200.26.246:449
131.255.106.152:449
142.112.79.223:449
154.126.176.30:449
180.92.238.186:449
187.20.217.129:449
201.20.118.122:449
202.91.41.138:449
95.210.118.90:449
Unpacked files
SH256 hash:
ad4d766ba1804bce283cd8591d7652f9fcceb67c5f2d10b34842802a30271290
MD5 hash:
95082efc7251ba20746626707225d6bc
SHA1 hash:
4b2ad233ce5d4af3bc957dd67a222133e62d0d52
SH256 hash:
b17ac3df1c652090182fe11982f8443a484ce74cf8bf0b7b1f68e22009822540
MD5 hash:
26dc673b823292c30b5366ce95d6214e
SHA1 hash:
572ae3a9054e41c2ee0d493f202087dc4d39afcc
SH256 hash:
6ce241a4be761faaa0a77bc804a80fce66c3a9661be201c56dc22b9d4c5554ba
MD5 hash:
f5a9ab9cab5488cc3e56209d75314a3e
SHA1 hash:
e207635e6c605e59a7ac50d30c0903138b1c724e
Detections:
win_trickbot_a4
win_trickbot_auto
SH256 hash:
18a3ed7a253f8e074805bfedc4cf6aab316ce4909913e2dc8aedbc19fce668ca
MD5 hash:
46ea0661444ba5f0c09c59938883fcaa
SHA1 hash:
dee40cdb15046a6a1f47445b6202034e9a0d77e6
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Delivery method
Other
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.