MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e0e241f1479e494612d18459ad11d5cab9a70792bb0b5ef6fb7811285e99e1a1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: e0e241f1479e494612d18459ad11d5cab9a70792bb0b5ef6fb7811285e99e1a1
SHA3-384 hash: cfaca8eee99b71c776a383f441e2b64dca8df0301b242fb544e8166ffa2839d0282fb32174d02ea0b59a54da15c5e434
SHA1 hash: 89325fc7edf2eaf3dc72306f2abf5412cbe85387
MD5 hash: faa0272bb29d8e076f3fbe2b0c25a0bc
humanhash: indigo-rugby-moon-eleven
File name:SecuriteInfo.com.W32.AIDetect.malware1.9853.30767
Download: download sample
Signature TrickBot
File size:443'904 bytes
First seen:2021-03-19 22:30:58 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 4f0c2c904283b81b81368f0a41d1a1ac (9 x IcedID, 2 x TrickBot)
ssdeep 12288:93mA9qPKUYmC1hSUOw1K3HOOHYFGI46J:9H95UWSUzcuL54C
Threatray 2 similar samples on MalwareBazaar
TLSH 1C9412516D656040FABF8E711A70EB34E57C668926486E0FE37F7C495D839E1B00E3E2
Reporter SecuriteInfoCom
Tags:TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
308
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 372301 Sample: SecuriteInfo.com.W32.AIDete... Startdate: 19/03/2021 Architecture: WINDOWS Score: 48 27 Multi AV Scanner detection for submitted file 2->27 8 loaddll32.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 regsvr32.exe 8->12         started        14 rundll32.exe 8->14         started        process5 16 iexplore.exe 2 84 10->16         started        process6 18 iexplore.exe 5 158 16->18         started        dnsIp7 21 edge.gycpi.b.yahoodns.net 87.248.118.22, 443, 49741, 49742 YAHOO-DEBDE United Kingdom 18->21 23 tls13.taboola.map.fastly.net 151.101.1.44, 443, 49744, 49745 FASTLYUS United States 18->23 25 10 other IPs or domains 18->25
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2021-03-19 20:48:53 UTC
AV detection:
7 of 27 (25.93%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
e0e241f1479e494612d18459ad11d5cab9a70792bb0b5ef6fb7811285e99e1a1
MD5 hash:
faa0272bb29d8e076f3fbe2b0c25a0bc
SHA1 hash:
89325fc7edf2eaf3dc72306f2abf5412cbe85387
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

DLL dll e0e241f1479e494612d18459ad11d5cab9a70792bb0b5ef6fb7811285e99e1a1

(this sample)

Comments