MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 261e6a161980bf628360fc371e791ccd31740ec571ebd523e742404e350ffb05. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 261e6a161980bf628360fc371e791ccd31740ec571ebd523e742404e350ffb05
SHA3-384 hash: 2b004122a4470cbb719ea107009d7e01144180af0c5cbf197e14e19e1d9effdd32e94e2f05070c9c2dfb4a4f2cb3a154
SHA1 hash: 7309451f4b1fed133654005297076366d71cda7d
MD5 hash: 36047bf16e1db97eb2311574e6b3d442
humanhash: ack-north-twelve-kansas
File name:261e6a161980bf628360fc371e791ccd31740ec571ebd523e742404e350ffb05
Download: download sample
Signature TrickBot
File size:218'624 bytes
First seen:2020-10-24 21:04:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 3072:gawb0n8EWm5cFk1oOG5UP2s56S9NsaIoZclXhJik65P9F88PadMlLlkJyKUN+A9F:ManqaMRJik65lCqa43KgegVKZzj0v
Threatray 2 similar samples on MalwareBazaar
TLSH EB245A1BB1A408FCD967C17ACA9B920BEAF23445032197DF1B608F565F13BE6A93D341
Reporter seifreed
Tags:TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
152
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
A
b
c
d
e
f
i
l
M
n
o
r
S
t
u
V
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 303466 Sample: 6kGuSh2cZr Startdate: 24/10/2020 Architecture: WINDOWS Score: 48 13 Multi AV Scanner detection for submitted file 2->13 6 6kGuSh2cZr.exe 2->6         started        process3 process4 8 WerFault.exe 20 9 6->8         started        file5 11 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 8->11 dropped
Threat name:
Win64.Trojan.TrickBot
Status:
Malicious
First seen:
2018-10-31 23:56:31 UTC
AV detection:
12 of 29 (41.38%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
51.68.170.58:443
68.3.14.71:443
174.105.235.178:449
92.223.105.190:443
181.113.17.230:449
174.105.233.82:449
66.60.121.58:449
207.140.14.141:443
42.115.91.177:443
5.189.227.109:443
71.94.101.25:443
206.130.141.255:449
74.140.160.33:449
76.181.182.166:449
140.190.54.187:449
82.222.40.119:449
24.119.69.70:449
107.174.218.155:443
103.110.91.118:449
68.4.173.10:443
207.191.33.112:449
103.111.53.126:449
105.27.171.234:449
182.253.20.66:449
199.182.59.42:449
71.193.151.218:443
46.149.182.112:449
66.97.164.222:449
199.227.126.250:449
115.78.3.170:443
197.232.50.85:443
94.232.20.113:443
190.145.74.84:449
47.49.168.50:443
73.67.78.5:449
67.49.38.139:443
Unpacked files
SH256 hash:
261e6a161980bf628360fc371e791ccd31740ec571ebd523e742404e350ffb05
MD5 hash:
36047bf16e1db97eb2311574e6b3d442
SHA1 hash:
7309451f4b1fed133654005297076366d71cda7d
Detections:
win_trickbot_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_trickbot_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments