MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4b2c39847825cdbc53f5a1afa37f047eeba06b7b490b191967e88cba0706df3e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
TrickBot
Vendor detections: 11
| SHA256 hash: | 4b2c39847825cdbc53f5a1afa37f047eeba06b7b490b191967e88cba0706df3e |
|---|---|
| SHA3-384 hash: | 052d8b395366739f5f4167498bef088b85a9875c95ebffd1c3aa87d4957c114b32ae41384307d91b6d2623306a059217 |
| SHA1 hash: | 95f9bd87449cd84b9ee8c4678d67c3b89f030362 |
| MD5 hash: | 022caec7ed77f286c0c5191aaaf75010 |
| humanhash: | winner-autumn-bluebird-happy |
| File name: | 4b2c39847825cdbc53f5a1afa37f047eeba06b7b490b191967e88cba0706df3e.bin |
| Download: | download sample |
| Signature | TrickBot |
| File size: | 724'153 bytes |
| First seen: | 2021-06-28 12:26:46 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat) |
| ssdeep | 12288:ehqxSLo5C1Ps4XhCMX8XL8PC3SrSal0l/elVxLmss8uIC:eHLmCiIhBSQP0SJignZmss85C |
| Threatray | 1'115 similar samples on MalwareBazaar |
| TLSH | 36F4D002B793C472C5E125311F24D7735739FC250F248B9BA3E40D6BBEAA1926A3D6D2 |
| Reporter | |
| Tags: | exe TrickBot |
Intelligence
File Origin
# of uploads :
1
# of downloads :
295
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
4b2c39847825cdbc53f5a1afa37f047eeba06b7b490b191967e88cba0706df3e.bin
Verdict:
Malicious activity
Analysis date:
2021-06-28 12:31:57 UTC
Tags:
evasion
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
TrickBot
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Hijacks the control flow in another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
Sigma detected: WScript or CScript Dropper
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Behaviour
Behavior Graph:
Detection:
trickbot
Threat name:
Win32.Trojan.Trickpak
Status:
Malicious
First seen:
2021-06-26 18:37:00 UTC
AV detection:
16 of 29 (55.17%)
Threat level:
5/5
Verdict:
malicious
Label(s):
trickbot
Similar samples:
+ 1'105 additional samples on MalwareBazaar
Result
Malware family:
trickbot
Score:
10/10
Tags:
family:trickbot botnet:sp1 banker trojan
Behaviour
Modifies registry class
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Looks up external IP address via web service
Loads dropped DLL
Trickbot
Malware Config
C2 Extraction:
14.232.161.45:443
118.173.233.64:443
41.57.156.203:443
45.239.234.2:443
45.201.136.3:443
177.10.90.29:443
185.17.105.236:443
91.237.161.87:443
185.189.55.207:443
186.225.119.170:443
143.0.208.20:443
222.124.16.74:443
220.82.64.198:443
200.236.218.62:443
178.216.28.59:443
45.239.233.131:443
196.216.59.174:443
119.202.8.249:443
82.159.149.37:443
49.248.217.170:443
181.114.215.239:443
113.160.132.237:443
105.30.26.50:443
202.165.47.106:443
103.122.228.44:443
118.173.233.64:443
41.57.156.203:443
45.239.234.2:443
45.201.136.3:443
177.10.90.29:443
185.17.105.236:443
91.237.161.87:443
185.189.55.207:443
186.225.119.170:443
143.0.208.20:443
222.124.16.74:443
220.82.64.198:443
200.236.218.62:443
178.216.28.59:443
45.239.233.131:443
196.216.59.174:443
119.202.8.249:443
82.159.149.37:443
49.248.217.170:443
181.114.215.239:443
113.160.132.237:443
105.30.26.50:443
202.165.47.106:443
103.122.228.44:443
Unpacked files
SH256 hash:
bfb2f13e8f07065c614542a748ec21de2739644ce5afda59ed7596dbe03092a9
MD5 hash:
35768094658e20133414eb5ef26da938
SHA1 hash:
7dd47efb24d2293ce476e53c146e716030bdbf62
SH256 hash:
cf95846acafaa285ceab1e40b748a3389d163a54d60d779fa3c750f95e36cf43
MD5 hash:
70f15eea01987d660be8b43ee92c8b1f
SHA1 hash:
7dc047d8dbb87b3e5534a77c8a8e6ce0f087adb1
SH256 hash:
56449967b64cc7f694478ed7b8a1b19399dc4628ebb77e7a9d2276845dd13eb5
MD5 hash:
d477c9127940f2c4252d192bdf642233
SHA1 hash:
74a27fce6bb82bd8976109ffb1d46713c3f4d7c4
Detections:
win_trickbot_a4
win_trickbot_auto
SH256 hash:
b1da42439f8929efb7eb2e9c46250db9c606822abf9ccf7b60ef46e7c8141eb0
MD5 hash:
64a596ef58ed91394e6a459a044a7d4e
SHA1 hash:
6d95a8218d2f0b45725b97248fc762eac734dcb4
SH256 hash:
3e6f419c537ea2b45f920ba4a0ed86627539510e066ef450d717c63c881a59a1
MD5 hash:
213aef9bb66675281898d2a9a8975b1d
SHA1 hash:
b8705f748c6be5a3728eb60206aa302f4861daa7
SH256 hash:
4b2c39847825cdbc53f5a1afa37f047eeba06b7b490b191967e88cba0706df3e
MD5 hash:
022caec7ed77f286c0c5191aaaf75010
SHA1 hash:
95f9bd87449cd84b9ee8c4678d67c3b89f030362
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.