MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 93b3b0800018230f58cad9b4ec1d13e9336f0f46062dd49bc43a9394c1bdd1b4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 93b3b0800018230f58cad9b4ec1d13e9336f0f46062dd49bc43a9394c1bdd1b4
SHA3-384 hash: 0911dd7a2d3c57feb4d8fd1bf5c27b6ad99b7bff24d2ff2e54abcd0cb9a92177557a9b70850268e1d0924dcd61080b75
SHA1 hash: 9d5139e65e36716e9932848d68ce1bb0ed92c86c
MD5 hash: ae11dfe64032e62f5da834e19ee8280c
humanhash: ceiling-white-kilo-timing
File name:bfrbzmvlhj.exe
Download: download sample
Signature TrickBot
File size:630'272 bytes
First seen:2020-12-30 07:06:39 UTC
Last seen:2020-12-30 08:48:23 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 34d0e0acc873895fbac775a034ee500f (2 x TrickBot)
ssdeep 12288:R7dt29E0xWlz1OGuzrRIcBEEPTmWL7SJFHwRA9AmV5tKoO:fWE0xWlAGeVAam8
Threatray 2'965 similar samples on MalwareBazaar
TLSH 2DD4BE11B780D476C26631318A56D3746ABABD609F3583877BD43B3E5F342C19A38B1E
Reporter JAMESWT_WT
Tags:TrickBot

Intelligence


File Origin
# of uploads :
2
# of downloads :
387
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
bfrbzmvlhj.exe
Verdict:
Malicious activity
Analysis date:
2020-12-30 07:09:49 UTC
Tags:
installer evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Sending a UDP request
Deleting a recently created file
Launching a process
Connection attempt
Unauthorized injection to a system process
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Trickbot
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
Allocates memory in foreign processes
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected Trickbot
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.TrickBotCrypt
Status:
Malicious
First seen:
2020-12-30 07:02:57 UTC
File Type:
PE (Exe)
Extracted files:
55
AV detection:
17 of 48 (35.42%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:mor6 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Trickbot
Malware Config
C2 Extraction:
103.231.115.106:449
117.222.63.100:449
117.254.58.83:449
149.54.11.54:449
170.82.4.64:449
177.11.12.93:449
182.16.187.251:449
187.108.86.48:449
190.152.88.57:449
203.88.149.33:449
36.89.191.119:449
41.159.31.227:449
85.202.128.243:449
92.204.160.82:449
103.150.68.124:449
103.126.185.7:449
103.112.145.58:449
103.110.53.174:449
102.164.208.48:449
102.164.208.44:449
Unpacked files
SH256 hash:
93b3b0800018230f58cad9b4ec1d13e9336f0f46062dd49bc43a9394c1bdd1b4
MD5 hash:
ae11dfe64032e62f5da834e19ee8280c
SHA1 hash:
9d5139e65e36716e9932848d68ce1bb0ed92c86c
SH256 hash:
30bd8cd8b343fdcbf7a70d396a23fd336a5a7fd7832651995bfd5194a954366e
MD5 hash:
bde1c1fc31079067cd2e4f17c30de872
SHA1 hash:
0c0254bdfdf3905910305369b79c6d51c609ae0e
Detections:
win_trickbot_a4 win_trickbot_auto
SH256 hash:
cbe41aec5347ce559c873e2e2e47e4d0e265906d340c4ea6561dc5c5b4ba016b
MD5 hash:
8a46b3d87fb8bee78bc478afc95db3cb
SHA1 hash:
f170645be609129ebad46f07c5e170568d91b37d
SH256 hash:
49e9752f3495988d8bf007a627ff30b373f544bcf204b830885bb996e484a3ff
MD5 hash:
7a4a7d33cb018b1113ec63b16380c4eb
SHA1 hash:
fdce37db21f547ab4104854dac327e49aeeb79e8
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments