MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 76e78467254c1222cf7d03484a2584a707fdcaa9ffcab2b7323a2958c72667f4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 76e78467254c1222cf7d03484a2584a707fdcaa9ffcab2b7323a2958c72667f4
SHA3-384 hash: 45609a4eafd0c544a0de0add8542f3e8deb638dbd5b8260ab3e7371a7effa19fe96b38ea9b0c2c5f2d72a177c0b3721b
SHA1 hash: 7cc61af016ec8c930ce18d1b9d0a32657f35d165
MD5 hash: 138925da4d5bf0ce59d0a63512e5fd12
humanhash: comet-quebec-oven-asparagus
File name:138925da4d5bf0ce59d0a63512e5fd12.exe
Download: download sample
Signature TrickBot
File size:647'168 bytes
First seen:2021-10-07 08:45:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 96459f3ac5474c1f5d7b0f19d0d0d7ca (4 x TrickBot)
ssdeep 12288:SeDQXlHsrpApiu2YOMrnnRY2Lx1yZR9qVa:nKlHsrpAHEMjDT44Va
Threatray 4'139 similar samples on MalwareBazaar
TLSH T181D4D052BBD0C876C9A311320EE29B3567FDED115B228BC757D45E1EACB26C08E36316
File icon (PE):PE icon
dhash icon 71b119dcce576333 (3'570 x Heodo, 203 x TrickBot, 19 x Gh0stRAT)
Reporter abuse_ch
Tags:exe TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
221
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
138925da4d5bf0ce59d0a63512e5fd12.exe
Verdict:
Suspicious activity
Analysis date:
2021-10-07 08:46:58 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware keylogger packed
Result
Threat name:
TrickBot
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Allocates memory in foreign processes
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found malware configuration
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected Trickbot
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.TrickBot
Status:
Malicious
First seen:
2021-10-07 02:29:42 UTC
AV detection:
18 of 45 (40.00%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:tot159 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Trickbot
Malware Config
C2 Extraction:
179.42.137.102:443
191.36.152.198:443
179.42.137.104:443
179.42.137.106:443
179.42.137.108:443
202.183.12.124:443
194.190.18.122:443
103.56.207.230:443
171.103.187.218:449
171.103.189.118:449
18.139.111.104:443
179.42.137.105:443
186.4.193.75:443
171.101.229.2:449
179.42.137.107:443
103.56.43.209:449
179.42.137.110:443
45.181.207.156:443
197.44.54.162:449
179.42.137.109:443
103.59.105.226:449
45.181.207.101:443
117.196.236.205:443
72.224.45.102:449
179.42.137.111:443
96.47.239.181:443
171.100.112.190:449
117.196.239.6:443
Unpacked files
SH256 hash:
4434646e062e73bd79f6afb2ea8981d0f7cd838343e776d46e2cb3592216cd83
MD5 hash:
325fa20904170c78dbaba9d18e13a968
SHA1 hash:
d7d71e30a365b8064b5d07529a1694776bdde9f9
SH256 hash:
1d550c158d5792d5f3a46dcf3aa884821afae0c1bcd1dcebaaeb92a71a108f44
MD5 hash:
09b3afcb2d6ac1385be79f8754fe15a1
SHA1 hash:
90460cf7ba0beca3af9dc7d7b9adc46b2da76e65
Detections:
win_trickbot_auto
SH256 hash:
76e78467254c1222cf7d03484a2584a707fdcaa9ffcab2b7323a2958c72667f4
MD5 hash:
138925da4d5bf0ce59d0a63512e5fd12
SHA1 hash:
7cc61af016ec8c930ce18d1b9d0a32657f35d165
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe 76e78467254c1222cf7d03484a2584a707fdcaa9ffcab2b7323a2958c72667f4

(this sample)

  
Delivery method
Distributed via web download

Comments