MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b161eb34e5513131f4b0a4c0318646ed3448122445d7924e03ff5822a6e2d2dd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: b161eb34e5513131f4b0a4c0318646ed3448122445d7924e03ff5822a6e2d2dd
SHA3-384 hash: 4ee0d2fa395e30f963de6f47df425dd2487ba4044cac2fc585b9575de3fc4dd0b1cc181b70e24f445f00f453ab9fcaf3
SHA1 hash: cdcd3bcb11ed490a9603808347455f52a1676ec8
MD5 hash: 48b86834eae4754427c9de930bd9ce90
humanhash: robin-eighteen-alpha-sodium
File name:http___142.11.195.33_images_lovemetertok.png
Download: download sample
Signature TrickBot
File size:557'056 bytes
First seen:2021-07-22 19:39:26 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash f3deb6209dc9c95daaecc9f849af840f (12 x TrickBot)
ssdeep 6144:6nhWubOStZ6AbgmgwLp3gUhWeGtLOPc/woVPHma1MXohuPATdTpNSTrbkYW412ph:6nTltgBNwxgUXw/DGaXhu45pI3rep
Threatray 874 similar samples on MalwareBazaar
TLSH T1DFC4CF2235E08577C4EF16345E667778A3FBBD942BF2C147679A891C6D339028B22327
dhash icon 71b119dcce576333 (3'570 x Heodo, 203 x TrickBot, 19 x Gh0stRAT)
Reporter Racco42
Tags:dll PNG TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
203
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
n/a
Score:
21 / 100
Signature
Initial sample is a PE file and has a suspicious name
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.TrickBot
Status:
Malicious
First seen:
2021-07-22 19:40:05 UTC
AV detection:
26 of 46 (56.52%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:rob109 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Trickbot
Malware Config
C2 Extraction:
38.110.103.124:443
185.56.76.28:443
204.138.26.60:443
60.51.47.65:443
74.85.157.139:443
68.69.26.182:443
38.110.103.136:443
38.110.103.18:443
138.34.28.219:443
185.56.76.94:443
217.115.240.248:443
24.162.214.166:443
80.15.2.105:443
154.58.23.192:443
38.110.100.104:443
45.36.99.184:443
185.56.76.108:443
185.56.76.72:443
138.34.28.35:443
97.83.40.67:443
38.110.103.113:443
38.110.100.142:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
38.110.100.33:443
38.110.100.242:443
185.13.79.3:443
Unpacked files
SH256 hash:
7429e3e9681fdfebc8210a744a9e41c7ad849f7af0c611ee4c272a67cbd44251
MD5 hash:
8c1a2825ab2da0ef39175720516294ca
SHA1 hash:
bdba87361cabe6814d5be5c0bb60b68f29b6e98a
SH256 hash:
59fc89c6cc4e85280791ab15e2e63e64fa4fd971bb57c0e266969bb2dbd9bc9a
MD5 hash:
dade50b747b1edd25607b2a6e7caa31a
SHA1 hash:
4d78b173bfd5bdf95d687c3bdfa3f8218e342bf4
SH256 hash:
8ec4c1b7bd6dc445b04d8d93740bcc72ee3ea94316e321c9fc7b5d77bfd314d5
MD5 hash:
9b49ff370e20a1581da344390b5a1d94
SHA1 hash:
085dd34e7281f8669a1e94001167cecd6c2be741
SH256 hash:
b161eb34e5513131f4b0a4c0318646ed3448122445d7924e03ff5822a6e2d2dd
MD5 hash:
48b86834eae4754427c9de930bd9ce90
SHA1 hash:
cdcd3bcb11ed490a9603808347455f52a1676ec8
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments