MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2eaa196b5f4f0d20b23dd82f001f369e05de803834a11cfe93dd7b795d9e6cd2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 2eaa196b5f4f0d20b23dd82f001f369e05de803834a11cfe93dd7b795d9e6cd2
SHA3-384 hash: b1805dcc0b790d957aacee44d863bacdee79b4116130fa50e8c5704fcbc875bbcf668523432e07c14835f89eb2d9f7c0
SHA1 hash: 85cca6fc2fdfab66c47188efc007d0b651c1536d
MD5 hash: d97e4caabf31d478bc931a0a1a47e08c
humanhash: snake-south-berlin-delaware
File name:d97e4caabf31d478bc931a0a1a47e08c.dll
Download: download sample
Signature TrickBot
File size:786'506 bytes
First seen:2021-03-13 09:08:04 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 31071badda1e7968ca6e154608046ad6 (3 x TrickBot)
ssdeep 12288:R3huEehO+HvYoMsLsDrKy947vFawRiwyz/3ZCRRm:PuEeY+PsmQwRxEGRm
Threatray 5 similar samples on MalwareBazaar
TLSH 0EF4DF5336E28276C6AF16300E652B29B7F5FDA44B75E5CB1380C92E5D729C34A3A313
Reporter abuse_ch
Tags:dll mon122 TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
379
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
TrickBot
Detection:
malicious
Classification:
troj
Score:
56 / 100
Signature
Multi AV Scanner detection for submitted file
Yara detected Trickbot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 368279 Sample: bTFgeRA60j.dll Startdate: 13/03/2021 Architecture: WINDOWS Score: 56 27 Multi AV Scanner detection for submitted file 2->27 29 Yara detected Trickbot 2->29 8 loaddll32.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 rundll32.exe 20 8->12         started        14 regsvr32.exe 8->14         started        process5 16 iexplore.exe 2 84 10->16         started        process6 18 iexplore.exe 5 155 16->18         started        dnsIp7 21 tls13.taboola.map.fastly.net 151.101.1.44, 443, 49737, 49738 FASTLYUS United States 18->21 23 geolocation.onetrust.com 104.20.184.68, 443, 49721, 49722 CLOUDFLARENETUS United States 18->23 25 9 other IPs or domains 18->25
Threat name:
Win32.Trojan.Trickpak
Status:
Malicious
First seen:
2021-03-12 07:20:16 UTC
AV detection:
16 of 28 (57.14%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:mon122 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Templ.dll packer
Trickbot
Malware Config
C2 Extraction:
103.225.138.94:449
122.2.28.70:449
123.200.26.246:449
131.255.106.152:449
142.112.79.223:449
154.126.176.30:449
180.92.238.186:449
187.20.217.129:449
201.20.118.122:449
202.91.41.138:449
95.210.118.90:449
Unpacked files
SH256 hash:
c9cb8751d5d7509bbab40ebf968d3a20262c3899e4fbc140b41de43f80b22efb
MD5 hash:
b87ece107ffafd8be19a2693eff4c64a
SHA1 hash:
bc73a0a09260e7fa3df7a6371fd67639a7e53979
Detections:
win_trickbot_a4 win_trickbot_auto
SH256 hash:
2bed4761c1c1d9fc99c1be6320174fb12dc23df6fd71fa8126be300c69b307d8
MD5 hash:
a9f138fd4e11b7b857917dc0d5e6c547
SHA1 hash:
98cb913fbd5c7053aaa88a98b5e896342886640d
SH256 hash:
2207904562a8eb35fe3619e1212fbe7cfb063cb0592e590c2d9999d24b1b84b8
MD5 hash:
52eba8f6b7cb9a4937c20a03f3cecd92
SHA1 hash:
0278c32e1c1dafe3f24bfd51f590de7bd0779b6f
SH256 hash:
2eaa196b5f4f0d20b23dd82f001f369e05de803834a11cfe93dd7b795d9e6cd2
MD5 hash:
d97e4caabf31d478bc931a0a1a47e08c
SHA1 hash:
85cca6fc2fdfab66c47188efc007d0b651c1536d
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

DLL dll 2eaa196b5f4f0d20b23dd82f001f369e05de803834a11cfe93dd7b795d9e6cd2

(this sample)

  
Delivery method
Distributed via web download

Comments