MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8b739e545fc95b979031b1d173680e40804cdfae954553daad04f865571072a5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 8b739e545fc95b979031b1d173680e40804cdfae954553daad04f865571072a5
SHA3-384 hash: 9125031b009309e1d1d28b57bb5657a6524eac97f23a5244670595432a326d9b0580e0bc926569132ffb0dff8578e24d
SHA1 hash: b699a23442a1c59f1e161b5140e0ac75a4e7f316
MD5 hash: 93c06fe98c490ca05ff794cc50b7fefa
humanhash: item-mountain-two-one
File name:49136 E2K 610622871149136 E2K 6106228711.zip
Download: download sample
Signature TrickBot
File size:656'949 bytes
First seen:2023-01-10 09:00:32 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:R+g0JhM47NEb20oJh3r1+vuYdMJXN9cnU2twpvhT5A5Z/KX9LfA:aJtmaX3/b9D+qVDtU
TLSH T199D4236909F38CB6705E2C70A28C5E49C835CC99ED7F4716AB797983D00D7C8EBBA452
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter cocaman
Tags:TrickBot zip


Avatar
cocaman
Malicious email (T1566.001)
From: "helena.kraft@serva.de" (likely spoofed)
Received: "from hosted-by.rootlayer.net (unknown [45.137.22.170]) "
Date: "10 Jan 2023 08:51:46 +0100"
Subject: "Ref: 4249136 E2K: 6106228711"
Attachment: "49136 E2K 610622871149136 E2K 6106228711.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
296
Origin country :
n/a
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:49136 E2K 610622871149136 E2K 6106228711.exe
File size:823'691 bytes
SHA256 hash: e7456c57dba442a7e63f2bd45ff5be6c8168f2fcfd15c5e405536fb3bb212dcb
MD5 hash: e8b61b099af93918a7d59477334471e0
MIME type:application/x-dosexec
Signature TrickBot
Vendor Threat Intelligence
Verdict:
No Threat
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Woreflint
Status:
Malicious
First seen:
2023-01-10 09:01:09 UTC
File Type:
Binary (Archive)
Extracted files:
33
AV detection:
8 of 41 (19.51%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
collection persistence spyware stealer
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Looks up external IP address via web service
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

TrickBot

zip 8b739e545fc95b979031b1d173680e40804cdfae954553daad04f865571072a5

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments