MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 828efc4ccc546b5253ab20243fc062e061149571e1e5fe7b683198cc858e00ea. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 828efc4ccc546b5253ab20243fc062e061149571e1e5fe7b683198cc858e00ea
SHA3-384 hash: cd635e3bf00a0d36e73299598492010dac352d463b4c4e6953a3d2cbebf7855b9fea556d8e11542da787891ce531cb65
SHA1 hash: 8f3192895870bccf232f9e6e9fdcf98bf21ad586
MD5 hash: a08edd294f3fe66f2321857293000605
humanhash: butter-maine-bacon-vermont
File name:a08edd294f3fe66f2321857293000605.dll
Download: download sample
Signature TrickBot
File size:305'664 bytes
First seen:2021-03-13 09:03:58 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 5257b5b96f130223691bf1928cb55d0b (2 x TrickBot)
ssdeep 6144:yRJhqLIHeDSI7bcLztllV+XMOvLOxoChHv2OscsSllW4F7:YJhMmeDSlLz7+XMOjDCI4FllW4F
Threatray 1 similar samples on MalwareBazaar
TLSH 4154F26132E4D031D19725714C7EC6370F7B3C2259B584862BB92F2A9EB0BD0BA7875B
Reporter abuse_ch
Tags:dll mon123 TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
366
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 368278 Sample: vLzEfdUD3f.dll Startdate: 13/03/2021 Architecture: WINDOWS Score: 48 29 Multi AV Scanner detection for submitted file 2->29 8 loaddll32.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 rundll32.exe 8->12         started        14 regsvr32.exe 8->14         started        process5 16 iexplore.exe 2 73 10->16         started        18 cmd.exe 12->18         started        process6 20 iexplore.exe 151 16->20         started        dnsIp7 23 edge.gycpi.b.yahoodns.net 87.248.118.23, 443, 49740, 49742 YAHOO-DEBDE United Kingdom 20->23 25 tls13.taboola.map.fastly.net 151.101.1.44, 443, 49736, 49737 FASTLYUS United States 20->25 27 10 other IPs or domains 20->27
Threat name:
Win32.Trojan.Trickpak
Status:
Malicious
First seen:
2021-03-12 17:02:51 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:mon123 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Trickbot
Malware Config
C2 Extraction:
103.225.138.94:449
122.2.28.70:449
123.200.26.246:449
131.255.106.152:449
142.112.79.223:449
154.126.176.30:449
180.92.238.186:449
187.20.217.129:449
201.20.118.122:449
202.91.41.138:449
95.210.118.90:449
Unpacked files
SH256 hash:
828efc4ccc546b5253ab20243fc062e061149571e1e5fe7b683198cc858e00ea
MD5 hash:
a08edd294f3fe66f2321857293000605
SHA1 hash:
8f3192895870bccf232f9e6e9fdcf98bf21ad586
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

DLL dll 828efc4ccc546b5253ab20243fc062e061149571e1e5fe7b683198cc858e00ea

(this sample)

  
Delivery method
Distributed via web download

Comments