MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fa95fc9f2caa61c910c18bcc51e21c5c5d621be79a7983db072f59e3db51d230. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: fa95fc9f2caa61c910c18bcc51e21c5c5d621be79a7983db072f59e3db51d230
SHA3-384 hash: b617107fdc66151a61309436543ddb63a6b8ca34e842ebd9eeb114259849a202ba723200cecdb0b9911c61dbf2fb81ea
SHA1 hash: c0b13e8a0b8e516779474bef356aba10bd9d73ef
MD5 hash: 34698d0aed6b452fb38ab5ef0ff7baf9
humanhash: carpet-ink-leopard-wyoming
File name:225N8Mk0.exe
Download: download sample
Signature TrickBot
File size:372'951 bytes
First seen:2020-04-22 09:18:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 0885b2b2b5829577912d5197330fc416 (300 x TrickBot)
ssdeep 6144:WBOO856a60r+UogID97/IXjBE7SL+MEXxtSbsP6AN4:WBOO3VKID90TBEhx4O6a4
Threatray 2'953 similar samples on MalwareBazaar
TLSH C684C0013CCFCCF2E4150131C8868BE49679BC2A3E5AD597FBB4295CDAB5381D92B26D
Reporter JoulK
Tags:TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
93
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-04-19 08:24:49 UTC
File Type:
PE (Exe)
Extracted files:
19
AV detection:
28 of 31 (90.32%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe fa95fc9f2caa61c910c18bcc51e21c5c5d621be79a7983db072f59e3db51d230

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::WriteConsoleA
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleOutputCP
KERNEL32.dll::GetConsoleCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileA
KERNEL32.dll::DeleteFileA
KERNEL32.dll::MoveFileA
KERNEL32.dll::FindFirstFileA
KERNEL32.dll::GetTempFileNameA

Comments