MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 42f45f4c485b41d36dbc6b9c3f7a97426c1cc301f917930e3eac293b17b4fa4c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 42f45f4c485b41d36dbc6b9c3f7a97426c1cc301f917930e3eac293b17b4fa4c
SHA3-384 hash: 3852e1fb9ab4c1552ea96e8290cb7b553afae660c951f0540f5dfe9a7f6709088f540bd1bd4b2e2d24e64b6db3cb2b86
SHA1 hash: df7fb318b1bc57c9faaae16030078ecf6c31ade7
MD5 hash: 0da589d9650df29542e60f9b417e514d
humanhash: ceiling-queen-september-muppet
File name:2811q2w3ez1x2c3.exe
Download: download sample
Signature TrickBot
File size:372'921 bytes
First seen:2020-04-22 15:17:00 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 0885b2b2b5829577912d5197330fc416 (300 x TrickBot)
ssdeep 6144:WBOO856a60r+UogID97/IXjBE7SL+MEXxtSbsP6ANV:WBOO3VKID90TBEhx4O6aV
Threatray 2'940 similar samples on MalwareBazaar
TLSH EB84CF013CCFCCF2E4150131C8868BE49679BC2A3E5AD597FBB4295CDAB5381D92B26D
Reporter JoulK
Tags:TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-04-19 09:09:16 UTC
File Type:
PE (Exe)
Extracted files:
19
AV detection:
28 of 31 (90.32%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe 42f45f4c485b41d36dbc6b9c3f7a97426c1cc301f917930e3eac293b17b4fa4c

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::WriteConsoleA
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleOutputCP
KERNEL32.dll::GetConsoleCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileA
KERNEL32.dll::DeleteFileA
KERNEL32.dll::MoveFileA
KERNEL32.dll::FindFirstFileA
KERNEL32.dll::GetTempFileNameA

Comments