MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bbb3583babc9a0957ab8871630cb2b085c82943d0fedfc258b8be4343f0fa1fa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: bbb3583babc9a0957ab8871630cb2b085c82943d0fedfc258b8be4343f0fa1fa
SHA3-384 hash: 3585b62622772124dfd496b5033c92ee6ee6f189da56e55dddd946156597a09dc4965c5e525eb55461735d3f5ef92cc4
SHA1 hash: ed67c104aa5b89cecdee6897d0338584bb9571e8
MD5 hash: c6e8053b71cc7a923f038d41ee8a5784
humanhash: eighteen-minnesota-four-robin
File name:mon82.dll
Download: download sample
Signature TrickBot
File size:481'280 bytes
First seen:2021-02-26 21:49:06 UTC
Last seen:2021-04-01 03:31:02 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash d58f8c685a55c040b873fa7058118534 (4 x TrickBot)
ssdeep 12288:QJmUwNGS5uURcQTticFX3xTjldqRrZHikO151k6:+mnNDdFHpZ4RZ81o
Threatray 1'826 similar samples on MalwareBazaar
TLSH DFA48D80BCC180BAF0EE9271556CA33639B677A1A7A4CBDFE3440D191FE5563113A29F
Reporter Cryptolaemus1
Tags:dll mon82 TrickBot

Intelligence


File Origin
# of uploads :
2
# of downloads :
196
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Changing a file
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 359098 Sample: mon82.dll Startdate: 26/02/2021 Architecture: WINDOWS Score: 48 32 Multi AV Scanner detection for submitted file 2->32 8 loaddll32.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 rundll32.exe 20 8->12         started        14 regsvr32.exe 8 8->14         started        process5 16 iexplore.exe 1 73 10->16         started        19 wermgr.exe 12->19         started        dnsIp6 24 192.168.2.1 unknown unknown 16->24 21 iexplore.exe 156 16->21         started        process7 dnsIp8 26 tls13.taboola.map.fastly.net 151.101.1.44, 443, 49762, 49763 FASTLYUS United States 21->26 28 geolocation.onetrust.com 104.20.184.68, 443, 49746, 49747 CLOUDFLARENETUS United States 21->28 30 8 other IPs or domains 21->30
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2021-02-25 23:59:18 UTC
AV detection:
10 of 48 (20.83%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot banker trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Templ.dll packer
Trickbot
Unpacked files
SH256 hash:
bbb3583babc9a0957ab8871630cb2b085c82943d0fedfc258b8be4343f0fa1fa
MD5 hash:
c6e8053b71cc7a923f038d41ee8a5784
SHA1 hash:
ed67c104aa5b89cecdee6897d0338584bb9571e8
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

DLL dll bbb3583babc9a0957ab8871630cb2b085c82943d0fedfc258b8be4343f0fa1fa

(this sample)

  
Delivery method
Distributed via web download

Comments