MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 45b253db751c69bdc1d532167e482ef03f426d4dd06a513d342faf61e976f269. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 45b253db751c69bdc1d532167e482ef03f426d4dd06a513d342faf61e976f269
SHA3-384 hash: 92b879b805805c3b1e1c09617afeb2dfc71e2956afe879d1cb7f9c3f4ba38eb09d96814ae0ea342120ea7f473d5ea896
SHA1 hash: a5cfcaf23b8c4ee9bf41d3313c1fc23165b412bc
MD5 hash: fd31b33bb492105756ba62d90b40b963
humanhash: seven-table-minnesota-speaker
File name:45b253db751c69bdc1d532167e482ef03f426d4dd06a513d342faf61e976f269
Download: download sample
Signature TrickBot
File size:357'864 bytes
First seen:2020-06-05 10:05:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e9c0657252137ac61c1eeeba4c021000 (53 x GuLoader, 26 x RedLineStealer, 17 x AgentTesla)
ssdeep 6144:0tZVS1aJWz9SNW12Tjzkwtlc9SbmQDE/ZiLJfKNBkNIH0A+N:cOaJWzANICdtlc9Sy0EBiNf/L/
Threatray 165 similar samples on MalwareBazaar
TLSH 887423C61B90E5D7E9E31FB028B0CC17AFB6634B54968A090B08E7957E173435B9E383
Reporter raashidbhatt
Tags:TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
74
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Ludicrouz
Status:
Malicious
First seen:
2020-06-04 00:38:30 UTC
AV detection:
20 of 30 (66.67%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike backdoor trojan
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Loads dropped DLL
Cobaltstrike
Malware Config
C2 Extraction:
http://ec2.amazzed.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments