MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dec9aa80ad429dfe99695c87c73b1721e68ee77997d5d04737e2f0a3214db1d8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara 1 Comments

SHA256 hash: dec9aa80ad429dfe99695c87c73b1721e68ee77997d5d04737e2f0a3214db1d8
SHA3-384 hash: 9e1a1b6243789b1fab647dd6ca4116a96dadc034bd10bb42b40900436687fdcbf5fbbdaf678f6df83e0015e03a3be05d
SHA1 hash: 94ac501fb466b9fcd48221d5295c5443c8471501
MD5 hash: 94096516b03e941a615e0b242d3deb34
humanhash: pluto-triple-cat-march
File name:SecuriteInfo.com.Trojan.Packed.140.28934.24660
Download: download sample
Signature TrickBot
File size:479'561 bytes
First seen:2020-08-01 19:34:04 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash eac14a3b805ec7ce3f4759f2fcfb40c4
ssdeep 6144:BRo8wwe9YCOnvHIOOpDTUyEYb/HJWQ8LOXwuAmLOZGtxcQaWtDoXyEjdARQ9b87e:B68ww/H8UypdwmLttxVuXyOzb8JeGmL3
TLSH 23A4AE37BD01D1AAE6B248B1986495757A263C3270B56E477283BEA864735C3B8F130F
Reporter @SecuriteInfoCom
Tags:TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
23
Origin country :
US US
Mail intelligence
No data
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Sending a UDP request
Delayed writing of the file
Deleting a recently created file
Launching a process
DNS request
Sending an HTTP GET request
Unauthorized injection to a system process
Sending a TCP request to an infection source
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
48 / 100
Signature
Contains functionality to detect sleep reduction / modifications
Machine Learning detection for sample
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Zenpak
Status:
Malicious
First seen:
2020-07-21 23:55:08 UTC
AV detection:
28 of 31 (90.32%)
Threat level
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
trojan banker family:trickbot
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Trickbot
Malware Config
Extraction:
95.171.16.42:443
185.90.61.9:443
5.1.81.68:443
185.99.2.65:443
134.119.191.11:443
85.204.116.100:443
78.108.216.47:443
51.81.112.144:443
194.5.250.121:443
185.14.31.104:443
185.99.2.66:443
107.175.72.141:443
192.3.247.123:443
134.119.191.21:443
85.204.116.216:443
91.235.129.20:443
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
110.93.15.98:449
80.210.32.67:449
103.111.83.246:449
200.107.35.154:449
36.89.182.225:449
36.89.243.241:449
36.92.19.205:449
110.50.84.5:449
182.253.113.67:449
36.66.218.117:449

Yara Signatures


Rule name:win_trickbot_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe dec9aa80ad429dfe99695c87c73b1721e68ee77997d5d04737e2f0a3214db1d8

(this sample)

  
Delivery method
Distributed via web download

Comments