MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8a4487a3600b2d07c283f5ec0d03a96efa902e834f80ce847f57a47cd41e39fd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 8a4487a3600b2d07c283f5ec0d03a96efa902e834f80ce847f57a47cd41e39fd
SHA3-384 hash: b098320f88df67ae863b80a6edbf3e141dad6cec0121830db560e0f351b837c45577b78e1779f8ece305e4d990e9e01a
SHA1 hash: ec7b552886a46df9fbd7165fbc80ef6a1187fd60
MD5 hash: 24fcf4da6334d9dc275b690f50f253e1
humanhash: papa-monkey-fanta-zebra
File name:16osndo411.exe
Download: download sample
Signature TrickBot
File size:270'779 bytes
First seen:2020-04-29 10:10:44 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2b9fa1ff20ba83f54b317241ba5b1513 (157 x TrickBot)
ssdeep 6144:XllmzPYXUMm0hj++Mz+wFGac08SAfl+MA5ykI:KrYnm+wFgHelI
Threatray 4'832 similar samples on MalwareBazaar
TLSH 6044E0527AE49812C9A40A304D579771ABB3BC346922C75BBF907F1EBCB46C1DD2433A
Reporter JoulK
Tags:exe TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
92
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Emotet
Status:
Malicious
First seen:
2020-04-29 10:36:27 UTC
File Type:
PE (Exe)
Extracted files:
50
AV detection:
27 of 30 (90.00%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe 8a4487a3600b2d07c283f5ec0d03a96efa902e834f80ce847f57a47cd41e39fd

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteA
SHELL32.dll::ShellExecuteExA
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateRemoteThread
KERNEL32.dll::CreateProcessA
KERNEL32.dll::OpenProcess
ADVAPI32.dll::OpenProcessToken
KERNEL32.dll::VirtualAllocEx
KERNEL32.dll::WriteProcessMemory
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetCommandLineA
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileA
KERNEL32.dll::DeleteFileA
KERNEL32.dll::GetWindowsDirectoryA
KERNEL32.dll::GetSystemDirectoryA
KERNEL32.dll::FindFirstFileA
VERSION.dll::GetFileVersionInfoSizeA
WIN_BASE_USER_APIRetrieves Account InformationADVAPI32.dll::LookupPrivilegeValueA
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExA
ADVAPI32.dll::RegOpenKeyExA
ADVAPI32.dll::RegQueryValueExA
ADVAPI32.dll::RegSetValueExA
WIN_SVC_APICan Manipulate Windows ServicesADVAPI32.dll::OpenSCManagerA
WIN_USER_APIPerforms GUI ActionsUSER32.dll::AppendMenuA
USER32.dll::EmptyClipboard
USER32.dll::FindWindowA
USER32.dll::OpenClipboard
USER32.dll::CreateWindowExA

Comments