MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 24147dab7aec7fa168f96741b5920c7fea04a2590919f1acd9d91031c4643026. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 24147dab7aec7fa168f96741b5920c7fea04a2590919f1acd9d91031c4643026
SHA3-384 hash: 0130a7970a2e50340e88c9a4882b29992dd8a8c5f20f0d47456ca1866229581de3d1cd429eb2c5620ebd7601261a73ee
SHA1 hash: 840377451945b3754bc69832a4874f9ae8e9b5be
MD5 hash: b00aeda58ca73b125235cdee0d420541
humanhash: pennsylvania-twenty-hamper-nebraska
File name:5129cddst.exe
Download: download sample
Signature TrickBot
File size:338'250 bytes
First seen:2020-08-06 09:13:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4a8c5544cd24df05aabef0164d767361 (413 x TrickBot)
ssdeep 6144:C12iazhHebQnUuPYhVY0YNrkcPdN09Qj8uytOItBwfwzvsmI3WEaCoqNSoIDcTft:C12tuQPPwYycd0iKDwCv01oqNS1DcTft
Threatray 5'109 similar samples on MalwareBazaar
TLSH AC74F102E5C74C3AD2652435163D3971AAB8DF1417BD9B2376C8C96B2899884DF3EB0B
Reporter JAMESWT_WT
Tags:TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Sending a UDP request
Delayed writing of the file
Deleting a recently created file
Launching a process
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Unauthorized injection to a system process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
48 / 100
Signature
Contains functionality to detect sleep reduction / modifications
Machine Learning detection for sample
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 258844 Sample: 5129cddst.exe Startdate: 06/08/2020 Architecture: WINDOWS Score: 48 11 Machine Learning detection for sample 2->11 6 5129cddst.exe 6 2->6         started        process3 signatures4 13 Contains functionality to detect sleep reduction / modifications 6->13 9 conhost.exe 6->9         started        process5
Threat name:
Win32.Trojan.TrickBot
Status:
Malicious
First seen:
2020-08-06 00:07:44 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
dave trojan banker family:trickbot
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Dave packer
Trickbot
Malware Config
C2 Extraction:
51.89.177.20:443
194.5.249.174:443
107.174.196.242:443
185.205.209.241:443
82.146.46.220:443
5.34.178.126:443
212.22.70.65:443
195.123.241.90:443
185.164.32.214:443
198.46.198.139:443
195.123.241.187:443
86.104.194.116:443
195.123.240.252:443
185.164.32.215:443
45.148.120.195:443
45.138.158.32:443
5.149.253.99:443
92.62.65.163:449
88.247.212.56:449
180.211.170.214:449
186.159.8.218:449
158.181.155.153:449
27.147.173.227:449
103.130.114.106:449
103.221.254.102:449
187.109.119.99:449
220.247.174.12:449
183.81.154.113:449
121.101.185.130:449
200.116.159.183:449
200.116.232.186:449
103.87.169.150:449
180.211.95.14:449
103.36.48.103:449
45.127.222.8:449
112.109.19.178:449
36.94.33.102:449
110.232.249.13:449
177.190.69.162:449
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe 24147dab7aec7fa168f96741b5920c7fea04a2590919f1acd9d91031c4643026

(this sample)

  
Delivery method
Distributed via web download

Comments