MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 210e03682a3d02a4ed1787cab12d998629314fb1999e594e4f00cb0b54ca9b94. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 210e03682a3d02a4ed1787cab12d998629314fb1999e594e4f00cb0b54ca9b94
SHA3-384 hash: bbd6f01a804c2fb3074d3424cb1b9e8600c09f88c25b97cc45fa0528e51113e334d4171eee0439d5e736bfd3f08f9f18
SHA1 hash: 441e48e784750a228e8e194e00e59e5a49404525
MD5 hash: ed7dff976c3a73a4338997318f0ef7f8
humanhash: william-don-winner-california
File name:SecuriteInfo.com.Variant.Bulz.349310.24122.28072
Download: download sample
Signature TrickBot
File size:307'712 bytes
First seen:2021-02-10 13:11:00 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 7db610b9f30e5230faec709d0d62a983 (2 x TrickBot)
ssdeep 6144:BDQgW6rDRS4At6+lHgSJcDW7rFNhjy9qJHHEccj2I02:BJpfDiLt17DnVI02
TLSH 2664DF00F6A08429F5FE0A373868FBD4E43E765DAF21CAA7BB1C856D07195934624F72
Reporter SecuriteInfoCom
Tags:TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
173
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
TrickBot
Detection:
malicious
Classification:
troj
Score:
60 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected Trickbot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 351282 Sample: SecuriteInfo.com.Variant.Bu... Startdate: 10/02/2021 Architecture: WINDOWS Score: 60 27 Multi AV Scanner detection for submitted file 2->27 29 Yara detected Trickbot 2->29 31 Machine Learning detection for sample 2->31 8 loaddll32.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 regsvr32.exe 8->12         started        process5 14 iexplore.exe 1 74 10->14         started        16 WerFault.exe 23 9 12->16         started        process6 18 iexplore.exe 155 14->18         started        dnsIp7 21 tls13.taboola.map.fastly.net 151.101.1.44, 443, 49773, 49774 FASTLYUS United States 18->21 23 geolocation.onetrust.com 104.20.184.68, 443, 49759, 49760 CLOUDFLARENETUS United States 18->23 25 8 other IPs or domains 18->25
Threat name:
Win32.Trojan.TrickBot
Status:
Malicious
First seen:
2021-02-10 01:52:03 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:mon43 banker trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Templ.dll packer
Trickbot
Malware Config
C2 Extraction:
194.5.249.156:443
142.202.191.164:443
193.8.194.96:443
45.155.173.242:443
108.170.20.75:443
185.163.45.138:443
94.140.114.136:443
134.119.186.202:443
200.52.147.93:443
45.230.244.20:443
186.250.157.116:443
186.137.85.76:443
36.94.62.207:443
182.253.107.34:443
Unpacked files
SH256 hash:
b655579b8e2a3660dba8ae858a4f2155be19af9c3e0bb69ad1ce840c1db585ad
MD5 hash:
12d6f846b6e50410d6a750842cd03187
SHA1 hash:
5339c87365f15ed4f629f7e84214740fad63892f
SH256 hash:
8bb66e2640769f619a8ac77749ce98c6b264db4384affbd5f6e6b2ba1af73235
MD5 hash:
5c7ddedc9c0e453fdf373c48ca5b2c61
SHA1 hash:
dd6d7277e937262d56eef014b7b36677a321db5b
Detections:
win_trickbot_a4 win_trickbot_auto
SH256 hash:
210e03682a3d02a4ed1787cab12d998629314fb1999e594e4f00cb0b54ca9b94
MD5 hash:
ed7dff976c3a73a4338997318f0ef7f8
SHA1 hash:
441e48e784750a228e8e194e00e59e5a49404525
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

DLL dll 210e03682a3d02a4ed1787cab12d998629314fb1999e594e4f00cb0b54ca9b94

(this sample)

  
Delivery method
Distributed via web download

Comments