MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 678de819abf5f00b28eaaa8239169a08a75050a4df26fe3ce5b262d6c7b6cb24. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
TrickBot
Vendor detections: 8
| SHA256 hash: | 678de819abf5f00b28eaaa8239169a08a75050a4df26fe3ce5b262d6c7b6cb24 |
|---|---|
| SHA3-384 hash: | 087cc8d9423f85e857a89de3cdd60ca917d1b06e660a95c51fc42672beb118452baa1d746d2cee9efad0267792927474 |
| SHA1 hash: | 9a39b6a0e942b3d7efda50285ce754f3ca86f3fd |
| MD5 hash: | ca01a71ccc8a2fa1d0f5573fb61ea336 |
| humanhash: | sad-grey-east-louisiana |
| File name: | ca01a71c_by_Libranalysis |
| Download: | download sample |
| Signature | TrickBot |
| File size: | 413'696 bytes |
| First seen: | 2021-05-06 15:03:11 UTC |
| Last seen: | 2021-05-06 16:02:05 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 88cc056314d3e98bc2df177b4a530af1 (1 x TrickBot) |
| ssdeep | 6144:khrKSoVwO2YQ8D4HHUSrSfB2EEWnFez575akXEU4FS1PudwlnXk:4noVwtYQ8zRfZl6574k09Vd+ |
| Threatray | 1'570 similar samples on MalwareBazaar |
| TLSH | FC94E11139E1C475E5AF113D09369B3A1BB7FC22CFB1D6CB67809E4D9C329819D2A326 |
| Reporter | |
| Tags: | TrickBot |
Intelligence
File Origin
# of uploads :
2
# of downloads :
272
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Result
Verdict:
Clean
Maliciousness:
Behaviour
Sending a UDP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Trickbot
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Delayed program exit found
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found malware configuration
Found potential dummy code loops (likely to delay analysis)
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Uses Windows timers to delay execution
Writes to foreign memory regions
Yara detected Trickbot
Behaviour
Behavior Graph:
Detection:
trickbot
Threat name:
Win32.Trojan.TrickBot
Status:
Malicious
First seen:
2021-05-06 15:04:08 UTC
AV detection:
12 of 29 (41.38%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
trickbot
Similar samples:
+ 1'560 additional samples on MalwareBazaar
Result
Malware family:
trickbot
Score:
10/10
Tags:
family:trickbot botnet:rob73 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Templ.dll packer
Trickbot
Malware Config
C2 Extraction:
103.66.72.217:443
117.252.68.211:443
103.124.173.35:443
115.73.211.230:443
117.54.250.246:443
131.0.112.122:443
102.176.221.78:443
181.176.161.143:443
154.79.251.172:443
103.111.199.76:443
103.54.41.193:443
154.79.244.182:443
154.79.245.158:443
139.255.116.42:443
178.254.161.250:443
178.134.47.166:443
158.181.179.229:443
103.90.197.33:443
109.207.165.40:443
178.72.192.20:443
117.252.68.211:443
103.124.173.35:443
115.73.211.230:443
117.54.250.246:443
131.0.112.122:443
102.176.221.78:443
181.176.161.143:443
154.79.251.172:443
103.111.199.76:443
103.54.41.193:443
154.79.244.182:443
154.79.245.158:443
139.255.116.42:443
178.254.161.250:443
178.134.47.166:443
158.181.179.229:443
103.90.197.33:443
109.207.165.40:443
178.72.192.20:443
Unpacked files
SH256 hash:
013f6a9a5761121b8013e5d3e0cb49e8327c6cd39eb91c6f9e273f6845d6ed4f
MD5 hash:
c38132b15d969f4b87fa5a53eb52b90c
SHA1 hash:
e6476b5ec3f85f1c370ef6d81ff0d7af1050d8d0
Detections:
win_trickbot_a4
win_trickbot_g6
win_trickbot_auto
SH256 hash:
2efafa4eef324992a6ffe8bf3519fc07a22cdc71f830f1fa7506c1145c255b8c
MD5 hash:
568bc1766aef23197cffdeb90b6ba8a5
SHA1 hash:
e17e548c5cbbd67a99ecd02daf568eed6899a660
Detections:
win_trickbot_a4
SH256 hash:
37089091ff4c2a69e4f63ad682205becc5ce68298f9cb3eeeaaf08334e75995b
MD5 hash:
965493e811c58bea4d01ea47b3c950cc
SHA1 hash:
390bbdf613fc4cf3799e3f62277bb8d601ca1bf7
Detections:
win_trickbot_a4
SH256 hash:
678de819abf5f00b28eaaa8239169a08a75050a4df26fe3ce5b262d6c7b6cb24
MD5 hash:
ca01a71ccc8a2fa1d0f5573fb61ea336
SHA1 hash:
9a39b6a0e942b3d7efda50285ce754f3ca86f3fd
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.21
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0012.001] Anti-Static Analysis::Argument Obfuscation
1) [F0002.001] Collection::Application Hook
2) [F0002.002] Collection::Polling
3) [B0030.002] Command and Control::Receive Data
4) [C0002.006] Communication Micro-objective::Download URL::HTTP Communication
5) [C0029.002] Cryptography Micro-objective::SHA1::Cryptographic Hash
6) [C0027.009] Cryptography Micro-objective::RC4::Encrypt Data
7) [C0028.002] Cryptography Micro-objective::RC4 KSA::Encryption Key
8) [C0021.004] Cryptography Micro-objective::RC4 PRGA::Generate Pseudo-random Sequence
9) [C0026.002] Data Micro-objective::XOR::Encode Data
12) [C0049] File System Micro-objective::Get File Attributes
13) [C0051] File System Micro-objective::Read File
14) [C0052] File System Micro-objective::Writes File
15) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
16) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
17) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
18) [C0036.001] Operating System Micro-objective::Set Registry Key::Registry
19) [C0040] Process Micro-objective::Allocate Thread Local Storage
20) [C0038] Process Micro-objective::Create Thread
21) [C0054] Process Micro-objective::Resume Thread
22) [C0041] Process Micro-objective::Set Thread Local Storage Value
23) [C0018] Process Micro-objective::Terminate Process