MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 48eacf290c0ed6287672551fcf426053f754c126c01fe6a01009c0ba599d3b8f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 48eacf290c0ed6287672551fcf426053f754c126c01fe6a01009c0ba599d3b8f
SHA3-384 hash: 7cd7d7956aa7f8992f2fa1c641010e35c151ae4bbee49643b9b6195abf6d24505bb04f53cdd545b24bb21c455ab6bd60
SHA1 hash: e78cea0939f886834af7844325baf57f500556ed
MD5 hash: e31f19e922d23d120305a0f4814f823e
humanhash: red-virginia-texas-beer
File name:mon41_cr.dll
Download: download sample
Signature TrickBot
File size:440'320 bytes
First seen:2021-02-12 18:43:09 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash ad7c879ee6648e49aa7a1f65db32681d (3 x TrickBot)
ssdeep 6144:S0O2GjydTwLK1KoiZxVtWcFoPQ4lmTZ4uvbCnfhSB8DX98I7EwlYOpvJe:S0O2GjydTwLK1Kf0chl4H5C8xNrvJe
TLSH E6947D8041DFE36CE6892636007AF1D7DB17FD67DA1E8DCBA5C8380186D4B9A711236B
Reporter James_inthe_box
Tags:dll TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
147
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 352562 Sample: mon41_cr.dll Startdate: 12/02/2021 Architecture: WINDOWS Score: 52 25 Multi AV Scanner detection for submitted file 2->25 27 Machine Learning detection for sample 2->27 8 loaddll32.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 regsvr32.exe 8->12         started        process5 14 iexplore.exe 1 74 10->14         started        process6 16 iexplore.exe 152 14->16         started        dnsIp7 19 tls13.taboola.map.fastly.net 151.101.1.44, 443, 49740, 49741 FASTLYUS United States 16->19 21 geolocation.onetrust.com 104.20.185.68, 443, 49728, 49729 CLOUDFLARENETUS United States 16->21 23 8 other IPs or domains 16->23
Threat name:
Win32.Trojan.Razy
Status:
Malicious
First seen:
2021-02-09 06:10:59 UTC
File Type:
PE (Dll)
Extracted files:
4
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
48eacf290c0ed6287672551fcf426053f754c126c01fe6a01009c0ba599d3b8f
MD5 hash:
e31f19e922d23d120305a0f4814f823e
SHA1 hash:
e78cea0939f886834af7844325baf57f500556ed
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments