MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8cabf6289b44834b67e0539a0c54e6305c8e466cc6981b9d10959fe07efb7494. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 8cabf6289b44834b67e0539a0c54e6305c8e466cc6981b9d10959fe07efb7494
SHA3-384 hash: e7b1e3bc91de3718051fff74ee361b10f5f15d86e6c7ba77e329985e027fc307514b69743238af1ba309643894c1ac40
SHA1 hash: 8120ccee6f20329dfdaae7b957e81948a04cf90a
MD5 hash: 7b9593e151bb5d86b60b6098ef145729
humanhash: video-saturn-cardinal-november
File name:8cabf6289b44834b67e0539a0c54e6305c8e466cc6981b9d10959fe07efb7494
Download: download sample
Signature TrickBot
File size:274'432 bytes
First seen:2020-11-13 16:08:37 UTC
Last seen:2024-07-24 18:47:51 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6217fe03c39443affcbda1e96cd4b77a (4 x TrickBot)
ssdeep 6144:1ECNtyLgM56VQa2f9z2JBN2L+4p04agIvqvAPNovO:VyLgM56pY9qnN7W08TAP
TLSH EF441203BAD2C075E1862379006D9A635B33BD110239DE53BB9CA68DEEE57E09F70359
Reporter seifreed
Tags:TrickBot

Intelligence


File Origin
# of uploads :
2
# of downloads :
181
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Connection attempt
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Trickbot
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Allocates memory in foreign processes
Delayed program exit found
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected Trickbot
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Emotet
Status:
Malicious
First seen:
2020-11-13 16:25:42 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:lib786 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Trickbot
Malware Config
C2 Extraction:
95.171.16.42:443
185.90.61.9:443
5.1.81.68:443
185.99.2.65:443
134.119.191.11:443
85.204.116.100:443
78.108.216.47:443
51.81.112.144:443
194.5.250.121:443
185.14.31.104:443
185.99.2.66:443
107.175.72.141:443
192.3.247.123:443
134.119.191.21:443
85.204.116.216:443
91.235.129.20:443
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
110.93.15.98:449
80.210.32.67:449
103.111.83.246:449
200.107.35.154:449
36.89.182.225:449
36.89.243.241:449
36.92.19.205:449
110.50.84.5:449
182.253.113.67:449
36.66.218.117:449
Unpacked files
SH256 hash:
8cabf6289b44834b67e0539a0c54e6305c8e466cc6981b9d10959fe07efb7494
MD5 hash:
7b9593e151bb5d86b60b6098ef145729
SHA1 hash:
8120ccee6f20329dfdaae7b957e81948a04cf90a
SH256 hash:
cca9efdec2b74a563b56b4d2087f4555ba3ed318718c1a2842832f9821b06576
MD5 hash:
f8b3d424a562e9b2bdd39222c61b93ec
SHA1 hash:
3e3cc800300898a9409908ad7bfd4a4222ee7b02
SH256 hash:
092d6a19c0078c9b492b25311c5b9b4270c10a2880242ab5f082ac76ea54c48c
MD5 hash:
b5f84ca3dfb58025158d74708b9ef2e8
SHA1 hash:
7f60283e0c3bdc24b0ec7addb42628fe45504bd5
Detections:
win_trickbot_a4 win_trickbot_g6 win_trickbot_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments