MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ea5c72bce7e028a6b2f9febd90751bf0e323da00b4b0d68be2a52ed21fe2a4d0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: ea5c72bce7e028a6b2f9febd90751bf0e323da00b4b0d68be2a52ed21fe2a4d0
SHA3-384 hash: 8f3537f92747626134dcd08765276ff3941bfb95d42ea28f946e7aa6e807c09ddec2be9c33f4e9e28d282d76f7371eb5
SHA1 hash: 294ecaa563146f4ca75b676e13c05320066505b2
MD5 hash: ff47e6eb2602178a4306e4fcecb15b7d
humanhash: washington-apart-fifteen-delta
File name:111.exe
Download: download sample
Signature TrickBot
File size:655'409 bytes
First seen:2020-10-16 18:03:39 UTC
Last seen:2020-10-16 19:22:47 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 102bf2afe741b63aec4e15a9eb05e419 (3 x TrickBot)
ssdeep 6144:2t4BiH46o7+mL62Dx37sb+8i9U3RSmQRfBiHJToV0YblF+ytAq0StUt6F4qXL2HK:w4BKE9sbLi9U36fBKobKBStmHqXuQDL
Threatray 2'860 similar samples on MalwareBazaar
TLSH 50D47D22B7F85201F1B39A305D3655E45A3ABCE66837CA0F1280A94D7879F42FD61F27
Reporter James_inthe_box
Tags:exe TrickBot

Intelligence


File Origin
# of uploads :
2
# of downloads :
188
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Creating a file in the %temp% directory
Delayed writing of the file
Deleting a recently created file
Launching a process
Connection attempt
Unauthorized injection to a system process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Allocates memory in foreign processes
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Bsymem
Status:
Malicious
First seen:
2020-10-16 06:52:15 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
trojan banker family:trickbot
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Trickbot
Malware Config
C2 Extraction:
51.89.163.40:443
89.223.126.186:443
45.67.231.68:443
148.251.185.165:443
194.87.110.144:443
213.32.84.27:443
185.234.72.35:443
45.89.125.148:443
195.123.240.104:443
185.99.2.243:443
5.182.211.223:443
195.123.240.113:443
85.204.116.173:443
5.152.210.188:443
103.36.48.103:449
36.94.33.102:449
36.91.87.227:449
177.190.69.162:449
103.76.169.213:449
179.97.246.23:449
200.24.67.161:449
181.143.186.42:449
190.99.97.42:449
179.127.88.41:449
117.252.214.138:449
117.222.63.145:449
45.224.213.234:449
45.237.241.97:449
125.165.20.104:449
Unpacked files
SH256 hash:
ea5c72bce7e028a6b2f9febd90751bf0e323da00b4b0d68be2a52ed21fe2a4d0
MD5 hash:
ff47e6eb2602178a4306e4fcecb15b7d
SHA1 hash:
294ecaa563146f4ca75b676e13c05320066505b2
SH256 hash:
36ed9da9d48428a438a3008b7ab0cc2335271559f8b11fd3026bff9661de675a
MD5 hash:
8b5b33687231aa12a62a5d2c439a58f7
SHA1 hash:
ccf5ec89daa22772514bfad767a4c6ce11ddc7c1
Detections:
win_trickbot_auto
SH256 hash:
685dd39de89fb49dee744188cd7dae72c4364a4cda2814f119f3bf6f9c96e22e
MD5 hash:
d409782514f821930255f4b2e5e6c7ab
SHA1 hash:
3747b849efc040248d358f0781643e5c42226a10
Detections:
win_trickbot_a4 win_trickbot_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_trickbot_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments