MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 26bdfa534ef10a0d74b5594bf044772e78e7a26acdbf2cb0dd54f7d949667511. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 26bdfa534ef10a0d74b5594bf044772e78e7a26acdbf2cb0dd54f7d949667511
SHA3-384 hash: 93b97a53ff222c3e73bda1671f4fd1701b83b6f0dc5bd6429b462b2984297e1bf5d9beb3150b4e441571d2e3270ea58b
SHA1 hash: 46e489ef16e8a3d12399bda4b0f4a672f22684b8
MD5 hash: de066a1e816dc749d2b84559c55fb930
humanhash: mike-emma-river-vermont
File name:9osndo411.exe
Download: download sample
Signature TrickBot
File size:270'395 bytes
First seen:2020-04-29 10:09:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2b9fa1ff20ba83f54b317241ba5b1513 (157 x TrickBot)
ssdeep 6144:XllmzPYXUMm0hj++Mz+wFGac08SAfl+MA5yki:KrYnm+wFgHeli
Threatray 4'821 similar samples on MalwareBazaar
TLSH 4F44E0427AE49812C9A40A304D5797756BB3BC346922C75BBF907F1EBCB86C1DD2433A
Reporter JoulK
Tags:exe TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
95
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Emotet
Status:
Malicious
First seen:
2020-04-29 10:36:18 UTC
File Type:
PE (Exe)
Extracted files:
50
AV detection:
27 of 31 (87.10%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe 26bdfa534ef10a0d74b5594bf044772e78e7a26acdbf2cb0dd54f7d949667511

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteA
SHELL32.dll::ShellExecuteExA
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateRemoteThread
KERNEL32.dll::CreateProcessA
KERNEL32.dll::OpenProcess
ADVAPI32.dll::OpenProcessToken
KERNEL32.dll::VirtualAllocEx
KERNEL32.dll::WriteProcessMemory
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetCommandLineA
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileA
KERNEL32.dll::DeleteFileA
KERNEL32.dll::GetWindowsDirectoryA
KERNEL32.dll::GetSystemDirectoryA
KERNEL32.dll::FindFirstFileA
VERSION.dll::GetFileVersionInfoSizeA
WIN_BASE_USER_APIRetrieves Account InformationADVAPI32.dll::LookupPrivilegeValueA
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExA
ADVAPI32.dll::RegOpenKeyExA
ADVAPI32.dll::RegQueryValueExA
ADVAPI32.dll::RegSetValueExA
WIN_SVC_APICan Manipulate Windows ServicesADVAPI32.dll::OpenSCManagerA
WIN_USER_APIPerforms GUI ActionsUSER32.dll::AppendMenuA
USER32.dll::EmptyClipboard
USER32.dll::FindWindowA
USER32.dll::OpenClipboard
USER32.dll::CreateWindowExA

Comments