MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 648d3b8639ff54b8741ec84898b213836594539de6f0c11a6c9f34dccf5e79fe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
TrickBot
Vendor detections: 6
| SHA256 hash: | 648d3b8639ff54b8741ec84898b213836594539de6f0c11a6c9f34dccf5e79fe |
|---|---|
| SHA3-384 hash: | ed2141e7d38bdeca2c64767138e8c9b6912c5c08505b078d4d815438c9ac01c476a44aa6eb76727017b231887f9589bb |
| SHA1 hash: | 3a5ade966e33a398b135c840064eb2a4e5fea761 |
| MD5 hash: | c5c8b64f2f89c074396266be3424e758 |
| humanhash: | low-friend-west-august |
| File name: | 1.exe |
| Download: | download sample |
| Signature | TrickBot |
| File size: | 409'600 bytes |
| First seen: | 2020-11-17 14:25:05 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | d8b0ac14806d3a77a305f39bb6d68b28 (1 x TrickBot) |
| ssdeep | 6144:DuLxVZ4/1IKyrl+usxgoLtA5FymrrD9W3Yd/i746C8+vDkDfrQKdul:SLx7Uyia5IsD43Yti73iDk7kl |
| Threatray | 2'948 similar samples on MalwareBazaar |
| TLSH | CD94D016AD405511FCEA15B105A891A839392C32B5109E0BB395FF9F29714C3EEFAF2F |
| Reporter | |
| Tags: | #Trickbot TrickBot |
Intelligence
File Origin
# of uploads :
1
# of downloads :
208
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Creating a file in the %temp% directory
Deleting a recently created file
Launching a process
Connection attempt
Unauthorized injection to a system process
Threat name:
Win32.Trojan.TrickBot
Status:
Malicious
First seen:
2020-11-13 02:13:30 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
suspicious
Similar samples:
+ 2'938 additional samples on MalwareBazaar
Result
Malware family:
trickbot
Score:
10/10
Tags:
family:trickbot botnet:yas2 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Trickbot
Malware Config
C2 Extraction:
195.123.240.138:443
162.212.158.129:443
144.172.64.26:443
62.108.37.145:443
91.200.103.193:443
194.5.249.195:443
195.123.240.18:443
162.212.158.129:443
144.172.64.26:443
62.108.37.145:443
91.200.103.193:443
194.5.249.195:443
195.123.240.18:443
Unpacked files
SH256 hash:
648d3b8639ff54b8741ec84898b213836594539de6f0c11a6c9f34dccf5e79fe
MD5 hash:
c5c8b64f2f89c074396266be3424e758
SHA1 hash:
3a5ade966e33a398b135c840064eb2a4e5fea761
SH256 hash:
c120011c83af0def99991bb67bb7421540257e8fc83c91ff6e9037506ea702ff
MD5 hash:
61dac78cec80abedee1b22c681fbf671
SHA1 hash:
6dc26f1d860ed70fa246854f082cfb55bc368a7d
SH256 hash:
fff5567f137cefe70609d0870e4b9884482469a68c2d5cd632b344adb2e329f0
MD5 hash:
b3da681e62189559645dad6fd33ae0d3
SHA1 hash:
f120e6110d02dea5f89730ca07085f504ddec716
Detections:
win_trickbot_a4
win_trickbot_g6
win_trickbot_auto
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.