MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 402008d2f30e935328b792c31f140a4867f00343e30dbcbe859cefe2d988554a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 402008d2f30e935328b792c31f140a4867f00343e30dbcbe859cefe2d988554a
SHA3-384 hash: 2b0f6dc1c7b3a03c537358494e58d30e32f195e38cd825268230f759d1433fcf92c049ec27424dee85778bc914839877
SHA1 hash: 58eb2cb370aea8b6fd1c45f126d00cd194f47701
MD5 hash: 8c1a5f7b777b0dc5fd2ad7b269f09af5
humanhash: may-may-eight-harry
File name:rev1.dll
Download: download sample
Signature TrickBot
File size:691'200 bytes
First seen:2021-03-16 04:28:00 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash cae73998be5b008dd1c2d777a562de39 (3 x TrickBot)
ssdeep 12288:5Fq5gJqjDe8jUCYPnXjX/5n85pFb85uuxR9cOU3sziSseDn6m62:X0+jXBnApFojX9cOUfBO
Threatray 1 similar samples on MalwareBazaar
TLSH D4E4AE1176E0C071C17A36705416E77856ADE8E0AF3D87CB6BD42A7F6F342C29A3835A
Reporter Cryptolaemus1
Tags:dll rev1 TrickBot


Avatar
Cryptolaemus1
found in a trite template for XLSB on 195.123.222.190

Intelligence


File Origin
# of uploads :
1
# of downloads :
263
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
TrickBot
Detection:
malicious
Classification:
troj
Score:
56 / 100
Signature
Multi AV Scanner detection for submitted file
Yara detected Trickbot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 369108 Sample: rev1.dll Startdate: 16/03/2021 Architecture: WINDOWS Score: 56 29 Multi AV Scanner detection for submitted file 2->29 31 Yara detected Trickbot 2->31 8 loaddll32.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 rundll32.exe 20 8->12         started        14 regsvr32.exe 8->14         started        process5 16 iexplore.exe 1 74 10->16         started        18 cmd.exe 12->18         started        process6 20 iexplore.exe 154 16->20         started        dnsIp7 23 edge.gycpi.b.yahoodns.net 87.248.118.22, 443, 49765, 49766 YAHOO-DEBDE United Kingdom 20->23 25 tls13.taboola.map.fastly.net 151.101.1.44, 443, 49759, 49760 FASTLYUS United States 20->25 27 10 other IPs or domains 20->27
Threat name:
Win32.Trojan.Zusy
Status:
Malicious
First seen:
2021-03-16 04:28:06 UTC
AV detection:
11 of 47 (23.40%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:rev1 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Templ.dll packer
Trickbot
Malware Config
C2 Extraction:
103.225.138.94:449
122.2.28.70:449
123.200.26.246:449
131.255.106.152:449
142.112.79.223:449
154.126.176.30:449
180.92.238.186:449
187.20.217.129:449
201.20.118.122:449
202.91.41.138:449
95.210.118.90:449
Unpacked files
SH256 hash:
1d355b999dd06b602b5ecf91a3a52d728040a8997310b7d3fc177ef897e77b1f
MD5 hash:
5cbccbbff1149aaf764e159a75b1f5ef
SHA1 hash:
3d457e388e64905a0b7596dd91a29f8130ea7031
Detections:
win_trickbot_a4 win_trickbot_auto
SH256 hash:
58b3cfb3956b359f132c1b2866bf4501abb1251de5fbb070b2ad7d200aa4ae04
MD5 hash:
beaadfb546ccf7b3eecdd6545d9b3b3b
SHA1 hash:
0daf7ae91d76c99d0cdec8a1f60bed10c75a1f3c
SH256 hash:
56b5aff8841770cafcd761eca56379d25f2046e3514d210806cb3e7e5d51d635
MD5 hash:
7dedd896f1327a387d64ee0f0f6abade
SHA1 hash:
02f877a65a0cd616f67d16f203a7f917c86cc9ea
SH256 hash:
402008d2f30e935328b792c31f140a4867f00343e30dbcbe859cefe2d988554a
MD5 hash:
8c1a5f7b777b0dc5fd2ad7b269f09af5
SHA1 hash:
58eb2cb370aea8b6fd1c45f126d00cd194f47701
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

TrickBot

DLL dll 402008d2f30e935328b792c31f140a4867f00343e30dbcbe859cefe2d988554a

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments