MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6b9c6a3cb61aa69e521120369f8d4bfbc91a4259dfe79996a512e2a1c3cd85ef. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
TrickBot
Vendor detections: 10
| SHA256 hash: | 6b9c6a3cb61aa69e521120369f8d4bfbc91a4259dfe79996a512e2a1c3cd85ef |
|---|---|
| SHA3-384 hash: | 5e465394c4a1b15018fb00b05360bafbade1145e2c062f24b1b38a06701df77f94fe7fbf0a3d600b8e087104fe6a7022 |
| SHA1 hash: | a3d5ba1050af75c889a8f5d38915d9ba2e33ecd0 |
| MD5 hash: | b7fc49c0ae002f03d2e4483dbc930bec |
| humanhash: | double-winter-zulu-mockingbird |
| File name: | 6b9c6a3cb61aa69e521120369f8d4bfbc91a4259dfe79996a512e2a1c3cd85ef |
| Download: | download sample |
| Signature | TrickBot |
| File size: | 507'904 bytes |
| First seen: | 2021-07-20 14:38:55 UTC |
| Last seen: | 2021-07-20 15:53:20 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 216d554ea2ea71d1271952610740e0b2 (1 x TrickBot) |
| ssdeep | 6144:KjoQkvVY1OHxH1Tz32FYBUPA3XoLfQJtH+9c9TXFbN0ULq0bdtKZ8+0859Jo16C/:8NkNYkTzG6X4LH9KjFbf16s8Fb |
| Threatray | 842 similar samples on MalwareBazaar |
| TLSH | T17BB49EE02EC4C432E1A7103E1856D2A926FE7C51BB23FA5F67887A6E1E315835D35336 |
| Reporter | Anonymous |
| Tags: | dll rob108 TrickBot |
Intelligence
File Origin
# of uploads :
2
# of downloads :
212
Origin country :
n/a
Vendor Threat Intelligence
Detection:
TrickBot
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
TrickBot
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
96 / 100
Signature
Allocates memory in foreign processes
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Hijacks the control flow in another process
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Sigma detected: CobaltStrike Load by Rundll32
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Behaviour
Behavior Graph:
Detection:
trickbot
Threat name:
Win32.Trojan.Trickpak
Status:
Malicious
First seen:
2021-07-19 21:36:48 UTC
AV detection:
13 of 28 (46.43%)
Threat level:
5/5
Verdict:
malicious
Label(s):
trickbot
Similar samples:
+ 832 additional samples on MalwareBazaar
Result
Malware family:
trickbot
Score:
10/10
Tags:
family:trickbot botnet:rob108 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Trickbot
Malware Config
C2 Extraction:
38.110.103.124:443
185.56.76.28:443
204.138.26.60:443
60.51.47.65:443
74.85.157.139:443
68.69.26.182:443
38.110.103.136:443
38.110.103.18:443
138.34.28.219:443
185.56.76.94:443
217.115.240.248:443
24.162.214.166:443
80.15.2.105:443
154.58.23.192:443
38.110.100.104:443
45.36.99.184:443
185.56.76.108:443
185.56.76.72:443
138.34.28.35:443
97.83.40.67:443
38.110.103.113:443
38.110.100.142:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
38.110.100.33:443
38.110.100.242:443
185.13.79.3:443
185.56.76.28:443
204.138.26.60:443
60.51.47.65:443
74.85.157.139:443
68.69.26.182:443
38.110.103.136:443
38.110.103.18:443
138.34.28.219:443
185.56.76.94:443
217.115.240.248:443
24.162.214.166:443
80.15.2.105:443
154.58.23.192:443
38.110.100.104:443
45.36.99.184:443
185.56.76.108:443
185.56.76.72:443
138.34.28.35:443
97.83.40.67:443
38.110.103.113:443
38.110.100.142:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
38.110.100.33:443
38.110.100.242:443
185.13.79.3:443
Unpacked files
SH256 hash:
d29b3fec32e0810a62005d27746b9667a0abee8ab78a877a89d4fce4a2d585a6
MD5 hash:
ab38343e9e5fd27f8fc9f4f61647f840
SHA1 hash:
f2d84041265151dd0856c8db234b39ae54047d69
SH256 hash:
f5a75742de47bb2740e0ffd41d6fbf1741f54f58659bf32a29c28ac1aff81be6
MD5 hash:
7c30867f2ebb42a557da4c55140b5bdd
SHA1 hash:
ca82330c91e6c69cb152a4efa2d5bf4e95668201
SH256 hash:
8727e6e555c37b1d8daafe36cb92482b72cc2675546a468f6a497390c63ceb6a
MD5 hash:
dc38cba49e4622189ed0e018aeabce7a
SHA1 hash:
591d4d78e4e558093539e51cfa91f8e173e087fe
SH256 hash:
79618db31363f9d5cf3f4e9aa33b8fc87a43968568524c5828c05e2cba18c1d9
MD5 hash:
87747531e2046f870562d7e2e36487ea
SHA1 hash:
57635637d347659eeef2d3715a643bf4e722bb11
Detections:
win_trickbot_auto
SH256 hash:
6b9c6a3cb61aa69e521120369f8d4bfbc91a4259dfe79996a512e2a1c3cd85ef
MD5 hash:
b7fc49c0ae002f03d2e4483dbc930bec
SHA1 hash:
a3d5ba1050af75c889a8f5d38915d9ba2e33ecd0
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.