MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 355d4c4c8eabcf15161ac4754c6a20fd1945c91a90f88e90de1d2ba2ac1545de. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 355d4c4c8eabcf15161ac4754c6a20fd1945c91a90f88e90de1d2ba2ac1545de
SHA3-384 hash: 1be7eaae73cf8a76665c1ceb6f3525768e5cb63fa973698ddaff6b6926be77b14d4e9735b2a8842e8bbf2a7c171e724a
SHA1 hash: d2c0dfdd419db0ab8c048131dfaf6b597f60aa1f
MD5 hash: 4a4ecfe12c4ce7f9ab8f5812cfcf50ec
humanhash: nebraska-fish-wolfram-item
File name:4a4ecfe12c4ce7f9ab8f5812cfcf50ec.exe
Download: download sample
Signature TrickBot
File size:1'980'928 bytes
First seen:2021-11-23 09:04:29 UTC
Last seen:2021-11-23 11:06:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d31639bc44b992226d49e6ecf1a2a248 (5 x TrickBot)
ssdeep 49152:+BQhCnUUbPhzn++Z3vrOzYN/z8PcrpQiX:
Threatray 4'312 similar samples on MalwareBazaar
TLSH T1C395C190338872E7F68BE53B5330983AB26639F57A6790C89BD37F4D586EE404F24941
File icon (PE):PE icon
dhash icon 787c78fa87f7e6c4 (16 x Gh0stRAT, 11 x Pikabot, 9 x ManusCrypt)
Reporter abuse_ch
Tags:exe TrickBot

Intelligence


File Origin
# of uploads :
2
# of downloads :
890
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
4a4ecfe12c4ce7f9ab8f5812cfcf50ec.exe
Verdict:
Suspicious activity
Analysis date:
2021-11-23 09:44:00 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a window
Creating a file in the %temp% directory
DNS request
Launching a process
Forced shutdown of a system process
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
TrickBot
Detection:
malicious
Classification:
troj
Score:
56 / 100
Signature
Multi AV Scanner detection for submitted file
Yara detected Trickbot
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Trickster
Status:
Malicious
First seen:
2021-11-23 09:05:20 UTC
File Type:
PE (Exe)
Extracted files:
28
AV detection:
25 of 45 (55.56%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
d6bc98ffb20d99fb776549d9ade851c1c0b7c64e5f445fc25ce6a32f5e0c010a
MD5 hash:
b7e5e6246dccc245d4b1849f8898e032
SHA1 hash:
3ecaed1f56ab860120873b5a71f8d4b227915f05
SH256 hash:
355d4c4c8eabcf15161ac4754c6a20fd1945c91a90f88e90de1d2ba2ac1545de
MD5 hash:
4a4ecfe12c4ce7f9ab8f5812cfcf50ec
SHA1 hash:
d2c0dfdd419db0ab8c048131dfaf6b597f60aa1f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe 355d4c4c8eabcf15161ac4754c6a20fd1945c91a90f88e90de1d2ba2ac1545de

(this sample)

  
Delivery method
Distributed via web download

Comments