MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8b2a8e5204ffb2fcf0b469a256a1d3b72618a66ad03ddd256210622bac56bae7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 8b2a8e5204ffb2fcf0b469a256a1d3b72618a66ad03ddd256210622bac56bae7
SHA3-384 hash: 802ea9b6969ba3751d4ce4f2eee55800f99b61374358ffa4981f4555b57120e054f5e965a52144fa4b1558364959c015
SHA1 hash: 34c4f2db725db6d4f257159a33aa73ad769ab779
MD5 hash: 4b71dba2a5b69a949bc63e3493f45ad1
humanhash: six-burger-uniform-nineteen
File name:4b71dba2a5b69a949bc63e3493f45ad1.exe
Download: download sample
Signature TrickBot
File size:803'551 bytes
First seen:2020-09-11 05:32:53 UTC
Last seen:2020-09-11 06:43:54 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 93dc88155a00ae749ca86929ba8dffd0 (23 x TrickBot)
ssdeep 12288:KbQ5Gmpe+jNBNF8KegmyC+cbGxRt4tIUcOWTFLR3q69zvEQIXE:KcFjZB38KeUC+cbYRt4UB9rhYE
Threatray 2'871 similar samples on MalwareBazaar
TLSH 78059E23AD40B44ADA0B0CB15DFD5A7918363C2164156D4BB2D5BE8C2CB2AD36DF932F
Reporter abuse_ch
Tags:exe TrickBot

Intelligence


File Origin
# of uploads :
2
# of downloads :
271
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Launching a process
Connection attempt
Unauthorized injection to a system process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.TrickbotCrypt
Status:
Malicious
First seen:
2020-09-11 05:34:06 UTC
AV detection:
25 of 28 (89.29%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
trojan banker family:trickbot
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Trickbot
Malware Config
C2 Extraction:
51.89.177.20:443
194.5.249.174:443
107.174.196.242:443
185.205.209.241:443
82.146.46.220:443
5.34.178.126:443
212.22.70.65:443
195.123.241.90:443
185.164.32.214:443
198.46.198.139:443
195.123.241.187:443
86.104.194.116:443
195.123.240.252:443
185.164.32.215:443
45.148.120.195:443
45.138.158.32:443
5.149.253.99:443
92.62.65.163:449
88.247.212.56:449
180.211.170.214:449
186.159.8.218:449
158.181.155.153:449
27.147.173.227:449
103.130.114.106:449
103.221.254.102:449
187.109.119.99:449
220.247.174.12:449
183.81.154.113:449
121.101.185.130:449
200.116.159.183:449
200.116.232.186:449
103.87.169.150:449
180.211.95.14:449
103.36.48.103:449
45.127.222.8:449
112.109.19.178:449
36.94.33.102:449
110.232.249.13:449
177.190.69.162:449
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe 8b2a8e5204ffb2fcf0b469a256a1d3b72618a66ad03ddd256210622bac56bae7

(this sample)

  
Delivery method
Distributed via web download

Comments