MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dbf6068360ed1baf457faa23299d36ce3058c582d7e1a704bec2ac47eb0ed833. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: dbf6068360ed1baf457faa23299d36ce3058c582d7e1a704bec2ac47eb0ed833
SHA3-384 hash: 011884c7f5f3409996586068d587b2192629ac47a66330d5a2664fc57f3b480aa009f015704a954ba06dd5e2d298de70
SHA1 hash: cdb08fea7a7ec7dc6592394396213ec74cc24714
MD5 hash: 16fe9319df7e1ef9ba9c4f523da6bb34
humanhash: monkey-zulu-robert-network
File name:14313687ead846bae3d6dc2187ebf1d00be.exe
Download: download sample
Signature TrickBot
File size:459'213 bytes
First seen:2020-04-22 06:42:54 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d2091b6df8b6ce72e745b9e2d419885d (135 x TrickBot)
ssdeep 12288:QboBb/W9ANGBAFb5i0P6HfewKQLYg0yCx5:4xBAiAHwfzo
Threatray 2'915 similar samples on MalwareBazaar
TLSH 6CA4CF11BAE244E6DC59453C8BE29BB03F79AC10AFD35AD757907D0F68B01C08933AB6
Reporter JoulK
Tags:TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Trickbot
Status:
Malicious
First seen:
2020-04-19 07:27:20 UTC
File Type:
PE (Exe)
Extracted files:
84
AV detection:
27 of 31 (87.10%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe dbf6068360ed1baf457faa23299d36ce3058c582d7e1a704bec2ac47eb0ed833

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::SetConsoleCtrlHandler
KERNEL32.dll::SetStdHandle
WIN_USER_APIPerforms GUI ActionsUSER32.dll::CreateWindowExW

Comments