MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9a5d5f4144492833b2f5368bf39154e0a5d60914afccbfde1db93cf0cd9db000. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 9a5d5f4144492833b2f5368bf39154e0a5d60914afccbfde1db93cf0cd9db000
SHA3-384 hash: b59cd35adf743e8c1994e948f66d535b76ffafe44a4a2f86c0f2bc7460bed7661fd89ad44403288e0a214a4f3f1c8323
SHA1 hash: 29ef527c9a7d54056217e7fec7fedb31bc7613ab
MD5 hash: e22c1dcff9212432e28981d39e54f4e1
humanhash: south-connecticut-juliet-mexico
File name:e22c1dcff9212432e28981d39e54f4e1.exe
Download: download sample
Signature TrickBot
File size:590'848 bytes
First seen:2021-09-30 17:28:04 UTC
Last seen:2021-09-30 19:11:10 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4052499054ea62aacc9b71303ced775c (12 x TrickBot)
ssdeep 12288:87UffyoMiaBpylVC/SzlA88rlbartq6r9XvBC4Zc0lSstUhZcR:87UfKyS/SzlAnarQW9XvjEhhZcR
Threatray 3'925 similar samples on MalwareBazaar
TLSH T1E5C4BE1177D0D032C2A335328F6BD674AAAEBD315F35874B27D03A3D5E346929A3871A
File icon (PE):PE icon
dhash icon 71b119dcce576333 (3'570 x Heodo, 203 x TrickBot, 19 x Gh0stRAT)
Reporter abuse_ch
Tags:exe tot156 TrickBot

Intelligence


File Origin
# of uploads :
2
# of downloads :
264
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e22c1dcff9212432e28981d39e54f4e1.exe
Verdict:
Suspicious activity
Analysis date:
2021-09-30 20:45:27 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Enabling autorun with the shell\open\command registry branches
Result
Threat name:
TrickBot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found malware configuration
Hijacks the control flow in another process
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Trickbot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 494579 Sample: qSWo6dt7Ii.exe Startdate: 30/09/2021 Architecture: WINDOWS Score: 100 58 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->58 60 Found malware configuration 2->60 62 Yara detected Trickbot 2->62 64 3 other signatures 2->64 7 qSWo6dt7Ii.exe 7 2->7         started        10 cmd.exe 1 2->10         started        process3 signatures4 66 Writes to foreign memory regions 7->66 68 Allocates memory in foreign processes 7->68 12 wermgr.exe 4 7->12         started        17 cmd.exe 7->17         started        19 qSWo6dt7Ii.exe 10->19         started        21 conhost.exe 10->21         started        process5 dnsIp6 52 179.42.137.107, 443, 49747, 49748 TelefonicadeArgentinaAR unknown 12->52 54 179.42.137.108, 443, 49760, 49761 TelefonicadeArgentinaAR unknown 12->54 56 9 other IPs or domains 12->56 44 C:\Users\user\AppData\...\qSWo6dt7Ii.exe, PE32 12->44 dropped 72 Hijacks the control flow in another process 12->72 74 Writes to foreign memory regions 12->74 76 Tries to detect virtualization through RDTSC time measurements 12->76 78 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 12->78 23 svchost.exe 11 12->23         started        28 svchost.exe 12->28         started        30 svchost.exe 12->30         started        80 Machine Learning detection for dropped file 19->80 82 Allocates memory in foreign processes 19->82 32 wermgr.exe 19->32         started        34 cmd.exe 19->34         started        file7 signatures8 process9 dnsIp10 46 109.87.143.67, 443, 49843, 49854 TRIOLANUA Ukraine 23->46 48 178.151.205.154, 443, 49837, 49848 TRIOLANUA Ukraine 23->48 50 9 other IPs or domains 23->50 36 C:\Users\user\AppData\Local\...\Web Data.bak, SQLite 23->36 dropped 38 C:\Users\user\AppData\...\Login Data.bak, SQLite 23->38 dropped 40 C:\Users\user\AppData\Local\...\History.bak, SQLite 23->40 dropped 42 C:\Users\user\AppData\Local\...\Cookies.bak, SQLite 23->42 dropped 70 Tries to harvest and steal browser information (history, passwords, etc) 23->70 file11 signatures12
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:tot156 banker trojan
Behaviour
Modifies registry class
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Trickbot
Malware Config
C2 Extraction:
179.42.137.102:443
191.36.152.198:443
179.42.137.104:443
179.42.137.106:443
179.42.137.108:443
202.183.12.124:443
194.190.18.122:443
103.56.207.230:443
171.103.187.218:449
171.103.189.118:449
18.139.111.104:443
179.42.137.105:443
186.4.193.75:443
171.101.229.2:449
179.42.137.107:443
103.56.43.209:449
179.42.137.110:443
45.181.207.156:443
197.44.54.162:449
179.42.137.109:443
103.59.105.226:449
45.181.207.101:443
117.196.236.205:443
72.224.45.102:449
179.42.137.111:443
96.47.239.181:443
171.100.112.190:449
117.196.239.6:443
Unpacked files
SH256 hash:
ada7a156e9b90d6796086f9c6cbc52282c6a28e02867693e277c3f53f86ba41a
MD5 hash:
4a8645e256465bdcd5246950e4914720
SHA1 hash:
92c5e4cf39d770e3259c7dbc25e82470f02fda48
SH256 hash:
7f0288461e4a81cd05885c0246a252b98a7393adbf5541c28e31079fceb0aaf3
MD5 hash:
35062ac99a2c041a7d41c7983b9d71e9
SHA1 hash:
0e47c07b9c6092d11e887e13c038d61496bb1253
SH256 hash:
9a5d5f4144492833b2f5368bf39154e0a5d60914afccbfde1db93cf0cd9db000
MD5 hash:
e22c1dcff9212432e28981d39e54f4e1
SHA1 hash:
29ef527c9a7d54056217e7fec7fedb31bc7613ab
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe 9a5d5f4144492833b2f5368bf39154e0a5d60914afccbfde1db93cf0cd9db000

(this sample)

  
Delivery method
Distributed via web download

Comments