MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c988a65d39f617c531454c2f15971c0a769d42ac84bea0a7a3bd89394ba3e654. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments 1

SHA256 hash: c988a65d39f617c531454c2f15971c0a769d42ac84bea0a7a3bd89394ba3e654
SHA3-384 hash: 2c6f5c05e90dc786b3ee7b502b382725f026e30e75a183273f2f33fce2a872e86ed8c343b11f437ffdd86ba9d825fc26
SHA1 hash: f4eac70c6ec4160f7939f56d4fd65b50a2b4b669
MD5 hash: 2c46770b7bccaba1280e5c39ac42f2fe
humanhash: oregon-march-east-white
File name:2c46770b7bccaba1280e5c39ac42f2fe
Download: download sample
Signature TrickBot
File size:1'972'736 bytes
First seen:2021-11-22 22:42:52 UTC
Last seen:2021-11-23 00:42:29 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d31639bc44b992226d49e6ecf1a2a248 (5 x TrickBot)
ssdeep 49152:nUiob4iogjOUcXQb0Np2/csvUMf3fs8E6mHGpV1S7LSYV+eo0E:
Threatray 4'313 similar samples on MalwareBazaar
TLSH T17D95F19C9EB35440EC1198F67F8FE7E05C0E271AF8DD4AE72528456402C04FF659BABA
File icon (PE):PE icon
dhash icon 787c78fa87f7e6c4 (16 x Gh0stRAT, 11 x Pikabot, 9 x ManusCrypt)
Reporter zbetcheckin
Tags:32 exe TrickBot

Intelligence


File Origin
# of uploads :
2
# of downloads :
832
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2c46770b7bccaba1280e5c39ac42f2fe
Verdict:
Malicious activity
Analysis date:
2021-11-22 22:51:19 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for synchronization primitives
Creating a window
Creating a file in the %temp% directory
DNS request
Sending a custom TCP request
Launching a process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm stealer wacatac
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
TrickBot
Detection:
malicious
Classification:
troj
Score:
64 / 100
Signature
Allocates memory in foreign processes
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Yara detected Trickbot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 526731 Sample: o38fQ55xnX Startdate: 22/11/2021 Architecture: WINDOWS Score: 64 13 Multi AV Scanner detection for submitted file 2->13 15 Yara detected Trickbot 2->15 6 o38fQ55xnX.exe 1 2->6         started        process3 signatures4 17 Writes to foreign memory regions 6->17 19 Allocates memory in foreign processes 6->19 9 cmd.exe 6->9         started        11 wermgr.exe 6->11         started        process5
Threat name:
Win32.Infostealer.Trickster
Status:
Malicious
First seen:
2021-11-22 22:43:17 UTC
File Type:
PE (Exe)
Extracted files:
28
AV detection:
26 of 45 (57.78%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
8f881e05c336f5276708fc304a940f32046b29252b6feef6bf761038d994e7d5
MD5 hash:
fc9059d8640d4e62cdf8733b94b86012
SHA1 hash:
5468aa6b2d3df3471f90197ef23b9e9169993d84
SH256 hash:
c988a65d39f617c531454c2f15971c0a769d42ac84bea0a7a3bd89394ba3e654
MD5 hash:
2c46770b7bccaba1280e5c39ac42f2fe
SHA1 hash:
f4eac70c6ec4160f7939f56d4fd65b50a2b4b669
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe c988a65d39f617c531454c2f15971c0a769d42ac84bea0a7a3bd89394ba3e654

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-11-22 22:42:53 UTC

url : hxxp://45.42.201.16/images/robert.png