MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4fa27ba2e31caf8817cbf4df694fbca99474ebb61e77954fe0260795c40055bc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 4fa27ba2e31caf8817cbf4df694fbca99474ebb61e77954fe0260795c40055bc
SHA3-384 hash: 9c09a426914207d947d7ec2ec6d721181413a2e74cc011493f267092729547f5291a177b99a4e6b303df072889fab8c2
SHA1 hash: a771edb69e7cc0f06e83b17d855aed683d5b39bc
MD5 hash: 9ee9a194805edb8bf80e3b96f89a0418
humanhash: vermont-shade-autumn-lima
File name:294ODNO38B.exe
Download: download sample
Signature TrickBot
File size:459'028 bytes
First seen:2020-04-22 15:27:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d2091b6df8b6ce72e745b9e2d419885d (135 x TrickBot)
ssdeep 12288:QboBb/W9ANGBAFb5i0P6HfewKQLYg0yCx1:4xBAiAHwfz6
Threatray 2'953 similar samples on MalwareBazaar
TLSH EAA4CF11BAE244E6DC59453C8BE29BB03F79AC10AFD35AD757907D4F68B01C08933AB6
Reporter JoulK
Tags:TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Trickbot
Status:
Malicious
First seen:
2020-04-19 09:09:48 UTC
File Type:
PE (Exe)
Extracted files:
84
AV detection:
28 of 31 (90.32%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe 4fa27ba2e31caf8817cbf4df694fbca99474ebb61e77954fe0260795c40055bc

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::SetConsoleCtrlHandler
KERNEL32.dll::SetStdHandle
WIN_USER_APIPerforms GUI ActionsUSER32.dll::CreateWindowExW

Comments