MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a9d1561ca761d4d98ba2739bd267fb8b9efabc89ca66a5b9513afb466bc24e09. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: a9d1561ca761d4d98ba2739bd267fb8b9efabc89ca66a5b9513afb466bc24e09
SHA3-384 hash: 98a53cf277267dcdbb0089aa2799731aa28421250769d87f932fe0cc255dcf1c507e3ff2c8f2afb804f7a28009b425ec
SHA1 hash: 87dacf413b0757baef01382de98b785beea3f1a5
MD5 hash: 56896cf396cbbe84e33061c63eeaaf3a
humanhash: wolfram-alpha-triple-east
File name:2291q2w3ez1x2c3.exe
Download: download sample
Signature TrickBot
File size:372'913 bytes
First seen:2020-04-22 09:26:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 0885b2b2b5829577912d5197330fc416 (300 x TrickBot)
ssdeep 6144:WBOO856a60r+UogID97/IXjBE7SL+MEXxtSbsP6ANi:WBOO3VKID90TBEhx4O6ai
Threatray 2'928 similar samples on MalwareBazaar
TLSH 0D84CF013CCFCCF2E4150131C8868BE49679BC2A3E5AD597FBB4295CDAB5381D92B26D
Reporter JoulK
Tags:TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
99
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-04-19 08:24:31 UTC
File Type:
PE (Exe)
Extracted files:
19
AV detection:
28 of 31 (90.32%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe a9d1561ca761d4d98ba2739bd267fb8b9efabc89ca66a5b9513afb466bc24e09

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::WriteConsoleA
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleOutputCP
KERNEL32.dll::GetConsoleCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileA
KERNEL32.dll::DeleteFileA
KERNEL32.dll::MoveFileA
KERNEL32.dll::FindFirstFileA
KERNEL32.dll::GetTempFileNameA

Comments