MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cd774e6a643ce65364e57bdd6e4eea43c08ad5ac157d43d9c232e7bbdce81dd4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: cd774e6a643ce65364e57bdd6e4eea43c08ad5ac157d43d9c232e7bbdce81dd4
SHA3-384 hash: 5ef23dcbe64d41a515b04af8e6155b0abdcf2b43470cfe09244029128db4ab4a994fd4393dd18d3d4650466b6e294024
SHA1 hash: 6b4f51126c575dbf9ba264bab17b602e31c23e0d
MD5 hash: 8dcc2d557edcd14aa33dd738ea58f937
humanhash: kitten-pennsylvania-september-fruit
File name:rockstargarmes.pdf
Download: download sample
Signature TrickBot
File size:614'400 bytes
First seen:2021-07-29 14:51:17 UTC
Last seen:2021-07-29 16:05:57 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 170fa18cf362a3ea8cc8edbec346f3aa (1 x TrickBot)
ssdeep 12288:gjBb925xIKt+wxNoC2NXH0tndFqvK9tZHkS1oKfqe9KS:A25xIKwlNEtdAvKjLzfES
Threatray 908 similar samples on MalwareBazaar
TLSH T1C7D4DF03F2E0C039C1BE02343F656BA8E6F9FD605DB5DA4767C18B4E5D32941AA36726
dhash icon 71b119dcce576333 (3'570 x Heodo, 203 x TrickBot, 19 x Gh0stRAT)
Reporter abuse_ch
Tags:dll rob116 TrickBot


Avatar
abuse_ch
38.110.103.124:443
185.56.76.28:443
204.138.26.60:443
60.51.47.65:443
74.85.157.139:443
68.69.26.182:443
38.110.103.136:443
38.110.103.18:443
138.34.28.219:443
185.56.76.94:443
217.115.240.248:443
24.162.214.166:443
80.15.2.105:443
154.58.23.192:443
38.110.100.104:443
45.36.99.184:443
185.56.76.108:443
185.56.76.72:443
138.34.28.35:443
97.83.40.67:443
38.110.103.113:443
38.110.100.142:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
38.110.100.33:443
38.110.100.242:443
185.13.79.3:443

Intelligence


File Origin
# of uploads :
3
# of downloads :
249
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
n/a
Score:
22 / 100
Signature
Initial sample is a PE file and has a suspicious name
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 456335 Sample: rockstargarmes.pdf Startdate: 29/07/2021 Architecture: WINDOWS Score: 22 20 Initial sample is a PE file and has a suspicious name 2->20 7 AcroRd32.exe 40 2->7         started        process3 dnsIp4 18 192.168.2.1 unknown unknown 7->18 10 RdrCEF.exe 44 7->10         started        12 AcroRd32.exe 2 5 7->12         started        process5 process6 14 RdrCEF.exe 10->14         started        16 RdrCEF.exe 10->16         started       
Threat name:
Win32.Trojan.Trickpak
Status:
Malicious
First seen:
2021-07-29 14:52:04 UTC
AV detection:
12 of 27 (44.44%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:rob116 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Trickbot
Malware Config
C2 Extraction:
38.110.103.124:443
185.56.76.28:443
204.138.26.60:443
60.51.47.65:443
74.85.157.139:443
68.69.26.182:443
38.110.103.136:443
38.110.103.18:443
138.34.28.219:443
185.56.76.94:443
217.115.240.248:443
24.162.214.166:443
80.15.2.105:443
154.58.23.192:443
38.110.100.104:443
45.36.99.184:443
185.56.76.108:443
185.56.76.72:443
138.34.28.35:443
97.83.40.67:443
38.110.103.113:443
38.110.100.142:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
38.110.100.33:443
38.110.100.242:443
185.13.79.3:443
Unpacked files
SH256 hash:
b18dfe371a14f62ecb632e70409857751f62c1d4fe4134bfee6a8f12bb945889
MD5 hash:
43afbcfa56885feb90e9fc6e2daaeccd
SHA1 hash:
fe529f33bf280a62a0130438db7d60224c83cdc2
Detections:
win_trickbot_auto
SH256 hash:
daaff5c4176c5b00ef557747c4de8fd08a2f719f1b37f2049317a195f4941e5f
MD5 hash:
08687c1c937450199101e07d2dc7ac18
SHA1 hash:
e47b37ab53bf16190f87f191465182f5e4ca9bdd
SH256 hash:
396ea9460e6b49f6b72f40e775eb9148fafc6b565b378d3429e2651254a87e4c
MD5 hash:
4da471445bbc62c8592113c7908688b6
SHA1 hash:
abfb23630d78909a052ac14e4ed3c8ba4312a3b1
SH256 hash:
6579252ca0d676f188a70163e4030721c8062315450d542b15570976632cb03e
MD5 hash:
5bc54425e9325ccc584080eb0de6b96d
SHA1 hash:
53c3529481468d9e3fd2d098eba08e8bd187587a
SH256 hash:
cd774e6a643ce65364e57bdd6e4eea43c08ad5ac157d43d9c232e7bbdce81dd4
MD5 hash:
8dcc2d557edcd14aa33dd738ea58f937
SHA1 hash:
6b4f51126c575dbf9ba264bab17b602e31c23e0d
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

TrickBot

DLL dll cd774e6a643ce65364e57bdd6e4eea43c08ad5ac157d43d9c232e7bbdce81dd4

(this sample)

Comments