MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 87b0e612957f6f789fd6683bd0ceb466012d1293f6423a2dd5063b81fff688ef. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 14


Intelligence 14 IOCs YARA 1 File information Comments

SHA256 hash: 87b0e612957f6f789fd6683bd0ceb466012d1293f6423a2dd5063b81fff688ef
SHA3-384 hash: e87e8e139b8597cff1bb7cbd783a3c286fefc57d11465e1159482eef02357166ea96c9cf517df64df953ea0d9d67aa11
SHA1 hash: fa1b6934046cddb35b9d1dea360ba35a6735f295
MD5 hash: 358d351d0350c61a239d94e1c2f69dc8
humanhash: emma-summer-autumn-april
File name:358d351d0350c61a239d94e1c2f69dc8.exe
Download: download sample
Signature TrickBot
File size:888'832 bytes
First seen:2021-10-17 07:19:30 UTC
Last seen:2021-10-17 08:18:54 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d3d730d77f19513c17bee56cad3fbfd5 (7 x TrickBot)
ssdeep 12288:0cfkUmruxF02xWt5bSoV/XHx8B8a4TrTEChqNi9rku/:KI02x+LXHqB8aErPqC3
Threatray 4'145 similar samples on MalwareBazaar
TLSH T17015BF1A3AF0C476C1A355700FF27B6AB6F9ED605B778AC753804A4D6D31DC14A3A23A
File icon (PE):PE icon
dhash icon 60f0f0b0e8b270d4 (7 x TrickBot)
Reporter abuse_ch
Tags:exe TrickBot

Intelligence


File Origin
# of uploads :
2
# of downloads :
520
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
358d351d0350c61a239d94e1c2f69dc8.exe
Verdict:
Malicious activity
Analysis date:
2021-10-17 07:26:42 UTC
Tags:
evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
emotet greyware keylogger packed wacatac
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
TrickBot
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
Allocates memory in foreign processes
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found malware configuration
Found potential dummy code loops (likely to delay analysis)
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected Trickbot
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Trickpak
Status:
Malicious
First seen:
2021-10-17 07:20:08 UTC
AV detection:
15 of 45 (33.33%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:lib166 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Trickbot
Malware Config
C2 Extraction:
36.91.117.231:443
36.89.228.201:443
103.75.32.173:443
45.115.172.105:443
36.95.23.89:443
103.123.86.104:443
202.65.119.162:443
202.9.121.143:443
139.255.65.170:443
110.172.137.20:443
103.146.232.154:443
36.91.88.164:443
103.47.170.131:443
122.117.90.133:443
103.9.188.78:443
210.2.149.202:443
118.91.190.42:443
117.222.61.115:443
117.222.57.92:443
136.228.128.21:443
103.47.170.130:443
36.91.186.235:443
103.194.88.4:443
116.206.153.212:443
58.97.72.83:443
139.255.6.2:443
Unpacked files
SH256 hash:
04d9755c3690d4b65d990cdf4a949516e57a771bec130e765daa6e74f2083d61
MD5 hash:
b3db4abd9d025f37bbfabc3e77e1ea00
SHA1 hash:
667902d22e2e1114baa70f1abbb387b5d8bfffef
Detections:
win_trickbot_g6 win_trickbot_auto
SH256 hash:
669baf474f7e8e265f40be3dcecf687e2bed8c3bab8b70433979276b6732ad9b
MD5 hash:
1418c85574199ecd07f2a52289683cef
SHA1 hash:
401fd344e1e17331429bca54a43d02046afa7a1d
SH256 hash:
e218b7b71706b03b428f87ab25b5eef63aa0c91de904266367beeb43a0e843a0
MD5 hash:
0916cd34a204443da0ed48df388044b8
SHA1 hash:
50cebc39386269e1e496804aae79c55209174597
SH256 hash:
87b0e612957f6f789fd6683bd0ceb466012d1293f6423a2dd5063b81fff688ef
MD5 hash:
358d351d0350c61a239d94e1c2f69dc8
SHA1 hash:
fa1b6934046cddb35b9d1dea360ba35a6735f295
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_trickbot_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.trickbot.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe 87b0e612957f6f789fd6683bd0ceb466012d1293f6423a2dd5063b81fff688ef

(this sample)

  
Delivery method
Distributed via web download

Comments