MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e70bf6458eee2cfcf961aa219af2296cf14df04a9dbb3686ddcde1478fe38265. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
TrickBot
Vendor detections: 9
| SHA256 hash: | e70bf6458eee2cfcf961aa219af2296cf14df04a9dbb3686ddcde1478fe38265 |
|---|---|
| SHA3-384 hash: | 004ea61e4b96d5233beee139bfd8c6b11704d3263a426acc3c70f49af8ab8e1c74da8e4e917cd9923d42cc750670e42b |
| SHA1 hash: | 3e4391374f9ecc3a8804ec5c3c002eecc42f4bcf |
| MD5 hash: | d88e5e358edf7547492895722279ad65 |
| humanhash: | violet-emma-mockingbird-eleven |
| File name: | 3F9E.dll |
| Download: | download sample |
| Signature | TrickBot |
| File size: | 860'160 bytes |
| First seen: | 2021-07-13 21:11:15 UTC |
| Last seen: | 2021-07-13 21:40:53 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 81c8d4efdaa8268b916771c030dbc02e (1 x TrickBot) |
| ssdeep | 24576:9FXrL6K8HH5wPa9oHc8sOTT/FeE1gJT7Tq8WC:9FXonnOcCTTZc7TqK |
| Threatray | 818 similar samples on MalwareBazaar |
| TLSH | T1D005CF51A2C18032F4FF01F695FD461B5965BEA10B3495CBB3C8EE4E2AB16D2AE30717 |
| Reporter | |
| Tags: | dll gtag mod7 mod7 TrickBot |
Intelligence
File Origin
# of uploads :
2
# of downloads :
181
Origin country :
n/a
Vendor Threat Intelligence
Detection:
TrickBot
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
TrickBot
Verdict:
Malicious
Result
Threat name:
TrickBot
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Allocates memory in foreign processes
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found malware configuration
May check the online IP address of the machine
Sigma detected: CobaltStrike Load by Rundll32
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected Trickbot
Behaviour
Behavior Graph:
Detection:
trickbot
Verdict:
malicious
Label(s):
trickbot
Similar samples:
+ 808 additional samples on MalwareBazaar
Result
Malware family:
trickbot
Score:
10/10
Tags:
family:trickbot botnet:mod7 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Trickbot
Malware Config
C2 Extraction:
38.110.103.124:443
185.56.76.28:443
204.138.26.60:443
60.51.47.65:443
74.85.157.139:443
68.69.26.182:443
38.110.103.136:443
38.110.103.18:443
138.34.28.219:443
185.56.76.94:443
217.115.240.248:443
24.162.214.166:443
80.15.2.105:443
154.58.23.192:443
38.110.100.104:443
45.36.99.184:443
185.56.76.108:443
185.56.76.72:443
138.34.28.35:443
97.83.40.67:443
38.110.103.113:443
38.110.100.142:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
38.110.100.33:443
38.110.100.242:443
185.13.79.3:443
185.56.76.28:443
204.138.26.60:443
60.51.47.65:443
74.85.157.139:443
68.69.26.182:443
38.110.103.136:443
38.110.103.18:443
138.34.28.219:443
185.56.76.94:443
217.115.240.248:443
24.162.214.166:443
80.15.2.105:443
154.58.23.192:443
38.110.100.104:443
45.36.99.184:443
185.56.76.108:443
185.56.76.72:443
138.34.28.35:443
97.83.40.67:443
38.110.103.113:443
38.110.100.142:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
38.110.100.33:443
38.110.100.242:443
185.13.79.3:443
Unpacked files
SH256 hash:
edf01a3a272ee12ba4e69e13b0a568848946bad92f18ae48de902aa84f80f75c
MD5 hash:
3bd398a31a88a9ee5e8fbcbf13637cea
SHA1 hash:
c4b60abf948d426cac182c9b84467dfe08b4594e
Detections:
win_trickbot_auto
SH256 hash:
7eea56a586c9ad44111e1d5bdee4be861120e3db2bfe193650bc5f4ff97a77f2
MD5 hash:
2b1d65f6bd06cbd8d8ac5919dfe02311
SHA1 hash:
8a4e3ef31bd32ef03e910fddb5ba1edb15e8c0bf
SH256 hash:
492fe76da3af2bc02f0b6738300714e87e5047f14bc27157642eeb5920b15190
MD5 hash:
90bd16538d5a14cc02680e94c4ac4686
SHA1 hash:
7ac496b55248a221725960e39e5b3e8197927a87
SH256 hash:
9b3e6da7494788629973535769ebbd870b370a40e613e7a5fb3c1670c130cb54
MD5 hash:
deadffdf7fc875c596ac271cb0449a6f
SHA1 hash:
6cdfe2189878f3cca148ece51b2ceacf42984573
SH256 hash:
e70bf6458eee2cfcf961aa219af2296cf14df04a9dbb3686ddcde1478fe38265
MD5 hash:
d88e5e358edf7547492895722279ad65
SHA1 hash:
3e4391374f9ecc3a8804ec5c3c002eecc42f4bcf
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.