MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9e2c9fa5f0c1bd5348d3a6996ab5855104ac9580defad7789f4296ce9d5305a0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
TrickBot
Vendor detections: 11
| SHA256 hash: | 9e2c9fa5f0c1bd5348d3a6996ab5855104ac9580defad7789f4296ce9d5305a0 |
|---|---|
| SHA3-384 hash: | 937c959c00cde1377aa92c1b90c0b512f46fd589f80e82a0648bb312e1c05ffc1a17f82825ab866f77399f1a45bf8df0 |
| SHA1 hash: | 3e5a8cf2c8bbf21c3f4edcc8720fa1db51234bac |
| MD5 hash: | d78b148f08b3a869fbc8fe66fa91ade0 |
| humanhash: | grey-pip-early-video |
| File name: | d78b148f08b3a869fbc8fe66fa91ade0.exe |
| Download: | download sample |
| Signature | TrickBot |
| File size: | 465'408 bytes |
| First seen: | 2021-07-22 15:39:20 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 13012c7764c22db0eea00ae6b1458d85 (7 x TrickBot) |
| ssdeep | 6144:ybRfnjXFr2KGL3bbHHjYXWOZcy8QGd37ci/fW6/gNXtlTF5yVNU5JhJDCyFE:UZr2zHHmjMd1W6/gNXtrkVQhJDrG |
| Threatray | 869 similar samples on MalwareBazaar |
| TLSH | T14EA4E02C3480F4F6E0230175C9999665CAADB8247B2378E7E7C46EFA7F655C09A3431E |
| dhash icon | 80a1ecf4f4687000 (7 x TrickBot) |
| Reporter | |
| Tags: | exe rob110 TrickBot |
Intelligence
File Origin
# of uploads :
1
# of downloads :
201
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
d78b148f08b3a869fbc8fe66fa91ade0.exe
Verdict:
Suspicious activity
Analysis date:
2021-07-22 15:43:30 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
TrickBot
Verdict:
Malicious
Result
Threat name:
TrickBot
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Allocates memory in foreign processes
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected Trickbot
Behaviour
Behavior Graph:
Detection:
trickbot
Threat name:
Win32.Trojan.TrickBotCrypt
Status:
Malicious
First seen:
2021-07-22 14:44:59 UTC
AV detection:
21 of 28 (75.00%)
Threat level:
5/5
Verdict:
malicious
Label(s):
trickbot
Similar samples:
+ 859 additional samples on MalwareBazaar
Result
Malware family:
trickbot
Score:
10/10
Tags:
family:trickbot botnet:rob110 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Trickbot
Malware Config
C2 Extraction:
38.110.103.124:443
185.56.76.28:443
204.138.26.60:443
60.51.47.65:443
74.85.157.139:443
68.69.26.182:443
38.110.103.136:443
38.110.103.18:443
138.34.28.219:443
185.56.76.94:443
217.115.240.248:443
24.162.214.166:443
80.15.2.105:443
154.58.23.192:443
38.110.100.104:443
45.36.99.184:443
185.56.76.108:443
185.56.76.72:443
138.34.28.35:443
97.83.40.67:443
38.110.103.113:443
38.110.100.142:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
38.110.100.33:443
38.110.100.242:443
185.13.79.3:443
185.56.76.28:443
204.138.26.60:443
60.51.47.65:443
74.85.157.139:443
68.69.26.182:443
38.110.103.136:443
38.110.103.18:443
138.34.28.219:443
185.56.76.94:443
217.115.240.248:443
24.162.214.166:443
80.15.2.105:443
154.58.23.192:443
38.110.100.104:443
45.36.99.184:443
185.56.76.108:443
185.56.76.72:443
138.34.28.35:443
97.83.40.67:443
38.110.103.113:443
38.110.100.142:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
38.110.100.33:443
38.110.100.242:443
185.13.79.3:443
Unpacked files
SH256 hash:
c4b678899879a9a33fe356a941f635685a72254d5982aa29d25c16396ddb16ea
MD5 hash:
d7f559b5548e77b31cca00fd300a4ef5
SHA1 hash:
5d8e8a884deebcb636c30a6e9497b21d867eef66
Detections:
win_trickbot_auto
Parent samples :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 hash:
9e2c9fa5f0c1bd5348d3a6996ab5855104ac9580defad7789f4296ce9d5305a0
MD5 hash:
d78b148f08b3a869fbc8fe66fa91ade0
SHA1 hash:
3e5a8cf2c8bbf21c3f4edcc8720fa1db51234bac
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.