MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7bc0a27df5b8420ca23081fb973bb68729bab7b6229513c81019f7be76deb8e1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 7bc0a27df5b8420ca23081fb973bb68729bab7b6229513c81019f7be76deb8e1
SHA3-384 hash: 7eedf80408c7795aa66a5f4f296142adb974bf672dbf1a3cd8baccef2c9c8e05907ff9f45e71c721d07461b77a2fdeee
SHA1 hash: 1a2803c5804ca9d68f6b59546493db6f95680d61
MD5 hash: ea252a83f501a1fd293d4a649cce274a
humanhash: island-lake-zebra-pluto
File name:lovemetertok.exe
Download: download sample
Signature TrickBot
File size:557'056 bytes
First seen:2021-07-21 13:02:00 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash f3deb6209dc9c95daaecc9f849af840f (12 x TrickBot)
ssdeep 6144:6nhWubOStZ6AbgmgwLp3gUhWeGthOPc/woVPHma1MXohuPATdTpNSTrbkYW412ph:6nTltgBNwxgUXy/DGaXhu45pI3rep
Threatray 849 similar samples on MalwareBazaar
TLSH T1BDC4CF2235E08577C4EF16345E667778A3FBBD942BF2C147679A890D6D339028B22327
dhash icon 71b119dcce576333 (3'570 x Heodo, 203 x TrickBot, 19 x Gh0stRAT)
Reporter JAMESWT_WT
Tags:dll rob109 TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
174
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.TrickBot
Status:
Malicious
First seen:
2021-07-21 13:02:23 UTC
File Type:
PE (Dll)
Extracted files:
26
AV detection:
13 of 46 (28.26%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:rob109 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Trickbot
Malware Config
C2 Extraction:
38.110.103.124:443
185.56.76.28:443
204.138.26.60:443
60.51.47.65:443
74.85.157.139:443
68.69.26.182:443
38.110.103.136:443
38.110.103.18:443
138.34.28.219:443
185.56.76.94:443
217.115.240.248:443
24.162.214.166:443
80.15.2.105:443
154.58.23.192:443
38.110.100.104:443
45.36.99.184:443
185.56.76.108:443
185.56.76.72:443
138.34.28.35:443
97.83.40.67:443
38.110.103.113:443
38.110.100.142:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
38.110.100.33:443
38.110.100.242:443
185.13.79.3:443
Unpacked files
SH256 hash:
7429e3e9681fdfebc8210a744a9e41c7ad849f7af0c611ee4c272a67cbd44251
MD5 hash:
8c1a2825ab2da0ef39175720516294ca
SHA1 hash:
bdba87361cabe6814d5be5c0bb60b68f29b6e98a
SH256 hash:
59fc89c6cc4e85280791ab15e2e63e64fa4fd971bb57c0e266969bb2dbd9bc9a
MD5 hash:
dade50b747b1edd25607b2a6e7caa31a
SHA1 hash:
4d78b173bfd5bdf95d687c3bdfa3f8218e342bf4
SH256 hash:
8ec4c1b7bd6dc445b04d8d93740bcc72ee3ea94316e321c9fc7b5d77bfd314d5
MD5 hash:
9b49ff370e20a1581da344390b5a1d94
SHA1 hash:
085dd34e7281f8669a1e94001167cecd6c2be741
SH256 hash:
7bc0a27df5b8420ca23081fb973bb68729bab7b6229513c81019f7be76deb8e1
MD5 hash:
ea252a83f501a1fd293d4a649cce274a
SHA1 hash:
1a2803c5804ca9d68f6b59546493db6f95680d61
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments