MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9744b85a140693e44849652f471ba7a53c213349f85e8055ae5e4233c75d1dad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
TrickBot
Vendor detections: 11
| SHA256 hash: | 9744b85a140693e44849652f471ba7a53c213349f85e8055ae5e4233c75d1dad |
|---|---|
| SHA3-384 hash: | c4a3d24366b598b73b257394355e4b16ae7563aee8139c2e72dc3bce35d442c7b558ec96e6380302e342fbd18f644a12 |
| SHA1 hash: | 29fda1648a832bf8b70ea355453fc890b8bd3c66 |
| MD5 hash: | 4667f2ac85f21d40d87302b19415acef |
| humanhash: | glucose-beryllium-berlin-papa |
| File name: | yuwxgoZIFLndvl.dll |
| Download: | download sample |
| Signature | TrickBot |
| File size: | 961'536 bytes |
| First seen: | 2021-08-02 20:38:39 UTC |
| Last seen: | 2021-08-02 22:11:51 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 99d9a584957572a810c8e33fd35a9f9a (1 x TrickBot) |
| ssdeep | 12288:jqaXVtfjXiMnRi5fRP0+yRSB0yYWAk+UI+nbVrSvIo5wm+t30lWF6QvNnIKckHR:jnbfj65fRUSGRZUI+nbBFdnIp4 |
| Threatray | 3'668 similar samples on MalwareBazaar |
| TLSH | T100157C123AC0C13AD27E3172852AE77566F9AC315CF5975B6ED41A3E1F309829A2C31F |
| dhash icon | 71b119dcce576333 (3'570 x Heodo, 203 x TrickBot, 19 x Gh0stRAT) |
| Reporter | |
| Tags: | dll TrickBot |
Intelligence
File Origin
# of uploads :
2
# of downloads :
202
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a UDP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Trickbot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Delayed program exit found
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found malware configuration
Hijacks the control flow in another process
May check the online IP address of the machine
Sigma detected: CobaltStrike Load by Rundll32
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Trickbot
Behaviour
Behavior Graph:
Detection:
trickbot
Threat name:
Win32.Trojan.Trickpak
Status:
Malicious
First seen:
2021-08-02 20:38:30 UTC
File Type:
PE (Dll)
Extracted files:
53
AV detection:
2 of 28 (7.14%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
trickbot
Similar samples:
+ 3'658 additional samples on MalwareBazaar
Result
Malware family:
trickbot
Score:
10/10
Tags:
family:trickbot botnet:rob118 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Trickbot
Malware Config
C2 Extraction:
65.152.201.203:443
185.56.175.122:443
46.99.175.217:443
179.189.229.254:443
46.99.175.149:443
181.129.167.82:443
216.166.148.187:443
46.99.188.223:443
128.201.76.252:443
62.99.79.77:443
60.51.47.65:443
24.162.214.166:443
45.36.99.184:443
97.83.40.67:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
185.56.175.122:443
46.99.175.217:443
179.189.229.254:443
46.99.175.149:443
181.129.167.82:443
216.166.148.187:443
46.99.188.223:443
128.201.76.252:443
62.99.79.77:443
60.51.47.65:443
24.162.214.166:443
45.36.99.184:443
97.83.40.67:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
Unpacked files
SH256 hash:
7db5bf06cfc04592c6cdffbf334f3be7342ee28e7823414c43269f496aff0a96
MD5 hash:
a282b28e3f78bda8093e9dddcbd77763
SHA1 hash:
bc70555d077ecbc73585340221f79b409d927603
SH256 hash:
98ddd8184bf4c0ea16f96af5410e78c161b343b143f5cd703a48cb8d86c9b569
MD5 hash:
7cb5c26881d2fb9a49585d321e783bbc
SHA1 hash:
a0b2c57d05a31dc3aed679fbc99a392443a27356
SH256 hash:
a98f817a376b364cee5e4498eb8685838df2c69f515767d1924e462c2f62e2a3
MD5 hash:
ed618cbb5754c81ef7b99cc9f7dbdc63
SHA1 hash:
873bcb3b47d9b4d58ef57bb427c0f4c1b03fa815
SH256 hash:
20802ad8a4dfce3ce45c7d7b26315ce78f75257447f0a198412c3e13119fedeb
MD5 hash:
72111999275d62436965730deac23a85
SHA1 hash:
39d7c50af24c0245cc633028b44c39bfdb6f7e9e
Detections:
win_trickbot_auto
SH256 hash:
9744b85a140693e44849652f471ba7a53c213349f85e8055ae5e4233c75d1dad
MD5 hash:
4667f2ac85f21d40d87302b19415acef
SHA1 hash:
29fda1648a832bf8b70ea355453fc890b8bd3c66
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Delivery method
Other
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.