MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f3e8b74205d3dfa40b7c618fe5f7d2031adb6722fad14c6a58517d0bf87c7a01. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: f3e8b74205d3dfa40b7c618fe5f7d2031adb6722fad14c6a58517d0bf87c7a01
SHA3-384 hash: cfd7f5bd3736d6a59a13de34dfdaeb87712dd9492f4e7e6ab2a01118590a159d48ba9c9dbefbad78dc0e03b7dd65694a
SHA1 hash: 097cc2d70de1779e76b76e32e4fd043cf31498b2
MD5 hash: b7e359f7786b76b7657659e7a6f12a5f
humanhash: fifteen-harry-michigan-magnesium
File name:pic.dll
Download: download sample
Signature TrickBot
File size:344'064 bytes
First seen:2020-12-28 17:22:45 UTC
Last seen:2020-12-28 18:54:33 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 2a9b446f7a4dc4fb7e912c8b845b8d52 (1 x TrickBot)
ssdeep 6144:ges7FB/0v3sKYsdvWPmv7pydfo/LZmurlV6S9+fcuM1a:gF7IFd+PmTsdf6ZHV6Scfcuca
Threatray 2'936 similar samples on MalwareBazaar
TLSH 3C74F0023186C4B2F15E417F4805C3A6177B34B19F78AAC7BFC1569E8B3A5D69E36382
Reporter abuse_ch
Tags:dll rob32 TrickBot


Avatar
abuse_ch
Malspam distributing TrickBot:

HELO: email.pioneeracademics.com
Sending IP: 212.146.220.138
From: Customer Service <techsupport@pioneeracademics.com>
Reply-To: Customer Service <admissions1@pioneeracademics.com>
Subject: Staffing Update xxx xxx
Attachment: Document_xxx.zip (contains "Document_xxx.xlsm")

TrickBot payload URL:
http://vermapaints.com/pic.gif

TrickBot C2s:
41.243.29.182:449
196.45.140.146:449
103.87.25.220:443
103.98.129.222:449
103.87.25.220:449
103.65.196.44:449
103.65.195.95:449
103.61.101.11:449
103.61.100.131:449
103.150.68.124:449
103.137.81.206:449
103.126.185.7:449
103.112.145.58:449
103.110.53.174:449
102.164.208.48:449
102.164.208.44:449

Intelligence


File Origin
# of uploads :
2
# of downloads :
394
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Sending a UDP request
Sending a custom TCP request
Unauthorized injection to a system process
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
clean
Classification:
n/a
Score:
7 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.TrickBotCrypt
Status:
Malicious
First seen:
2020-12-28 17:23:04 UTC
AV detection:
8 of 28 (28.57%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:rob32 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Templ.dll packer
Trickbot
Malware Config
C2 Extraction:
41.243.29.182:449
196.45.140.146:449
103.87.25.220:443
103.98.129.222:449
103.87.25.220:449
103.65.196.44:449
103.65.195.95:449
103.61.101.11:449
103.61.100.131:449
103.150.68.124:449
103.137.81.206:449
103.126.185.7:449
103.112.145.58:449
103.110.53.174:449
102.164.208.48:449
102.164.208.44:449
Unpacked files
SH256 hash:
f3e8b74205d3dfa40b7c618fe5f7d2031adb6722fad14c6a58517d0bf87c7a01
MD5 hash:
b7e359f7786b76b7657659e7a6f12a5f
SHA1 hash:
097cc2d70de1779e76b76e32e4fd043cf31498b2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments