MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c642dca14e48cae8391d5f100304b399b70a9c3967d7b7d3949ead3b96ba1a63. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: c642dca14e48cae8391d5f100304b399b70a9c3967d7b7d3949ead3b96ba1a63
SHA3-384 hash: 6e61ca6fa61e8872d3081f21d498d1bc0fea68986ea106b9db0e57dce93d5421a858554dc7b8bb17d25b0ab2905ee60c
SHA1 hash: 299c710f249b80580105014d4e4e9b92f32e0577
MD5 hash: 7ba23b2b6b50cfc3711362f465d926be
humanhash: texas-fish-social-sixteen
File name:mon4498.dll
Download: download sample
Signature TrickBot
File size:391'168 bytes
First seen:2021-02-12 18:42:40 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash b1499cb142564fa400e4b0c23ddfe209 (1 x TrickBot)
ssdeep 6144:fPJ2RupdW5InjhWSfLCkRQLJ93pwGWszsMuB6y4WRCk4y7hiJm:qQdZjhW8LDR2dPWcsMuB54WRb7hiJm
Threatray 101 similar samples on MalwareBazaar
TLSH BB84F20CF3EA8D90D5926AF9C568C9FE5829BC924C32D537BCCB3A1974F81944CE950E
Reporter James_inthe_box
Tags:dll TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
142
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
TrickBot
Detection:
malicious
Classification:
troj
Score:
60 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected Trickbot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 352563 Sample: mon4498.dll Startdate: 12/02/2021 Architecture: WINDOWS Score: 60 29 Multi AV Scanner detection for submitted file 2->29 31 Yara detected Trickbot 2->31 33 Machine Learning detection for sample 2->33 8 loaddll32.exe 1 2->8         started        10 WerFault.exe 2->10         started        process3 process4 12 cmd.exe 1 8->12         started        14 regsvr32.exe 8->14         started        16 regsvr32.exe 10->16 injected process5 18 iexplore.exe 1 73 12->18         started        process6 20 iexplore.exe 157 18->20         started        dnsIp7 23 edge.gycpi.b.yahoodns.net 87.248.118.22, 443, 49751, 49752 YAHOO-DEBDE United Kingdom 20->23 25 tls13.taboola.map.fastly.net 151.101.1.44, 443, 49753, 49754 FASTLYUS United States 20->25 27 10 other IPs or domains 20->27
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-02-11 04:34:38 UTC
File Type:
PE (Dll)
Extracted files:
10
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:mon44 banker trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Looks up external IP address via web service
Templ.dll packer
Trickbot
Malware Config
C2 Extraction:
194.5.249.156:443
142.202.191.164:443
193.8.194.96:443
45.155.173.242:443
108.170.20.75:443
185.163.45.138:443
94.140.114.136:443
134.119.186.202:443
200.52.147.93:443
45.230.244.20:443
186.250.157.116:443
186.137.85.76:443
36.94.62.207:443
182.253.107.34:443
Unpacked files
SH256 hash:
7b271c1ce3d56a02bee4d5b17903ebef8145faa40cf2588deaa8337246100a7e
MD5 hash:
1c0c80523301fefa1df8b96f5242cccb
SHA1 hash:
8e85920bb04dc29a4f02f030567f153b4d73d6e6
Detections:
win_trickbot_a4 win_trickbot_auto
SH256 hash:
2c24b76bb489136ebc17ab04ab2d1374e1e6e4c5313e48a861e8fecd622ea013
MD5 hash:
4b610beca973876ab93e17e3d5a017f1
SHA1 hash:
f68f84f65913396cfc24232c6afd6eb32e718fee
SH256 hash:
c642dca14e48cae8391d5f100304b399b70a9c3967d7b7d3949ead3b96ba1a63
MD5 hash:
7ba23b2b6b50cfc3711362f465d926be
SHA1 hash:
299c710f249b80580105014d4e4e9b92f32e0577
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments