MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3458eeb3abac470c3e15d8a39541322c8114ffab3997c9a49048dccb0aef5bbd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 3458eeb3abac470c3e15d8a39541322c8114ffab3997c9a49048dccb0aef5bbd
SHA3-384 hash: b996604bd0359f35624886b86f1966ca9889c767a9d1517188f58de8b0e31e9508d74fc72cf7c98370a4ce717adf200c
SHA1 hash: 413d29e8b23d38c41313107713756eb5acbd4341
MD5 hash: 4e1cec0599baa8ee949c648c3edbb1da
humanhash: louisiana-nevada-alanine-social
File name:2221q2w3ez1x2c3.exe
Download: download sample
Signature TrickBot
File size:373'146 bytes
First seen:2020-04-22 09:25:17 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 0885b2b2b5829577912d5197330fc416 (300 x TrickBot)
ssdeep 6144:WBOO856a60r+UogID97/IXjBE7SL+MEXxtSbsP6ANM:WBOO3VKID90TBEhx4O6aM
Threatray 2'928 similar samples on MalwareBazaar
TLSH EC84CF013CCFCCF2E4150131CC868BD49679BC2A3E5AD597EBB42A5CDAB5381D92B26D
Reporter JoulK
Tags:TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-04-19 08:24:48 UTC
File Type:
PE (Exe)
Extracted files:
19
AV detection:
28 of 31 (90.32%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe 3458eeb3abac470c3e15d8a39541322c8114ffab3997c9a49048dccb0aef5bbd

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::WriteConsoleA
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleOutputCP
KERNEL32.dll::GetConsoleCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileA
KERNEL32.dll::DeleteFileA
KERNEL32.dll::MoveFileA
KERNEL32.dll::FindFirstFileA
KERNEL32.dll::GetTempFileNameA

Comments