MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 849f40db8969a93cd74ecde7841a99dbae38005ad4b99a7348ad526ecb9e6b91. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 7


Intelligence 7 IOCs YARA 4 File information Comments

SHA256 hash: 849f40db8969a93cd74ecde7841a99dbae38005ad4b99a7348ad526ecb9e6b91
SHA3-384 hash: f7cf8925e61eccbbe24af599f3384049b4813061e06a8461e5522fe9a140cec142a005d27eb2e5afd4caf758c90f7101
SHA1 hash: d171a020229580d582e35dea6f861cbc57e967b4
MD5 hash: 05a469d94ac8706e6c5ce814db06762c
humanhash: william-kansas-fix-lamp
File name:squlDll64.dll
Download: download sample
Signature TrickBot
File size:7'732'952 bytes
First seen:2021-01-08 14:46:05 UTC
Last seen:2021-01-08 16:40:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a7f94fc658d3bc1c4662004264bce424 (1 x TrickBot)
ssdeep 196608:tpeVTcvsdp0oVG9WHJdi35ArtXTUC4C8WA:tv0p0oVGkXipGXgzC8WA
Threatray 1 similar samples on MalwareBazaar
TLSH 80766D00B3418219D9AB21B0487EE278262DB9E10B5266C773CC67FD5EB77C16E32797
Reporter 0x746f6d6669
Tags:TrickBot trickbotmodule

Intelligence


File Origin
# of uploads :
2
# of downloads :
208
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
squlDll64.dll
Verdict:
No threats detected
Analysis date:
2021-01-08 14:53:54 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 337489 Sample: squlDll64.dll Startdate: 08/01/2021 Architecture: WINDOWS Score: 56 16 Antivirus / Scanner detection for submitted sample 2->16 18 Multi AV Scanner detection for submitted file 2->18 6 loaddll64.exe 1 2->6         started        process3 process4 8 rundll32.exe 6->8         started        10 rundll32.exe 6->10         started        12 rundll32.exe 6->12         started        14 rundll32.exe 6->14         started       
Threat name:
Win64.Trojan.TrickBot
Status:
Malicious
First seen:
2020-11-09 19:09:00 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Unpacked files
SH256 hash:
849f40db8969a93cd74ecde7841a99dbae38005ad4b99a7348ad526ecb9e6b91
MD5 hash:
05a469d94ac8706e6c5ce814db06762c
SHA1 hash:
d171a020229580d582e35dea6f861cbc57e967b4
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:HKTL_Meterpreter_inMemory
Author:netbiosX, Florian Roth
Description:Detects Meterpreter in-memory
Reference:https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
Rule name:MALW_trickbot_bankBot
Author:Marc Salinas @Bondey_m
Description:Detects Trickbot Banking Trojan
Rule name:ReflectiveLoader
Description:Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments