MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6982fd2f130ac38b08191b0c4b3c09d6ca3f28af77765e7af58bf019004c5e0d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 6982fd2f130ac38b08191b0c4b3c09d6ca3f28af77765e7af58bf019004c5e0d
SHA3-384 hash: 677ebbcb355e373c05efad8547923a2fe8731cdcb295936666e9b8c3cfd0975679e085fb76528dfe1cbe1a8688e93b97
SHA1 hash: 4f6b2662c2049e5ba2010ecc1926546b43287f6c
MD5 hash: e9415c03181ce3381b6f73933616bfc3
humanhash: item-pennsylvania-grey-mexico
File name:1459cddst.exe
Download: download sample
Signature TrickBot
File size:338'199 bytes
First seen:2020-08-06 09:05:03 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4a8c5544cd24df05aabef0164d767361 (413 x TrickBot)
ssdeep 6144:C12iazhHebQnUuPYhVY0YNrkcPdN09Qj8uytOItBwfwzvsmI3WEaCoqNSoIDcTfy:C12tuQPPwYycd0iKDwCv01oqNS1DcTfy
Threatray 5'111 similar samples on MalwareBazaar
TLSH F474F102E5C74C3AD2652435173D3971AAB8DF1417BD9B2376C8C96B2899884DF3EB0B
Reporter JAMESWT_WT
Tags:TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
82
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Sending a UDP request
Delayed writing of the file
Deleting a recently created file
Launching a process
Connection attempt
Unauthorized injection to a system process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
48 / 100
Signature
Contains functionality to detect sleep reduction / modifications
Machine Learning detection for sample
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 258704 Sample: 1459cddst.exe Startdate: 06/08/2020 Architecture: WINDOWS Score: 48 11 Machine Learning detection for sample 2->11 6 1459cddst.exe 6 2->6         started        process3 signatures4 13 Contains functionality to detect sleep reduction / modifications 6->13 9 conhost.exe 6->9         started        process5
Threat name:
Win32.Trojan.TrickBot
Status:
Malicious
First seen:
2020-08-06 00:07:38 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
dave trojan banker family:trickbot
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Dave packer
Trickbot
Malware Config
C2 Extraction:
51.89.177.20:443
194.5.249.174:443
107.174.196.242:443
185.205.209.241:443
82.146.46.220:443
5.34.178.126:443
212.22.70.65:443
195.123.241.90:443
185.164.32.214:443
198.46.198.139:443
195.123.241.187:443
86.104.194.116:443
195.123.240.252:443
185.164.32.215:443
45.148.120.195:443
45.138.158.32:443
5.149.253.99:443
92.62.65.163:449
88.247.212.56:449
180.211.170.214:449
186.159.8.218:449
158.181.155.153:449
27.147.173.227:449
103.130.114.106:449
103.221.254.102:449
187.109.119.99:449
220.247.174.12:449
183.81.154.113:449
121.101.185.130:449
200.116.159.183:449
200.116.232.186:449
103.87.169.150:449
180.211.95.14:449
103.36.48.103:449
45.127.222.8:449
112.109.19.178:449
36.94.33.102:449
110.232.249.13:449
177.190.69.162:449
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe 6982fd2f130ac38b08191b0c4b3c09d6ca3f28af77765e7af58bf019004c5e0d

(this sample)

  
Delivery method
Distributed via web download

Comments