MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fd2ca05f1fb05028f501bce46ebb5e5131845b8f9e7c710fa527ed5ac0c15bc8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments 1

SHA256 hash: fd2ca05f1fb05028f501bce46ebb5e5131845b8f9e7c710fa527ed5ac0c15bc8
SHA3-384 hash: 427969379ab3673abafaee31ed8a146b3e35a2bb2b89d23103f66ec433803e9c3ebab482b8e959c57a1fd53cc50b30f1
SHA1 hash: 7a05b2f511ad7a8b4680071e1251942167368219
MD5 hash: 534a63969c5c1e6a574a8821a45e2a8e
humanhash: wolfram-lamp-yellow-oregon
File name:534a63969c5c1e6a574a8821a45e2a8e
Download: download sample
Signature TrickBot
File size:656'896 bytes
First seen:2021-11-05 22:19:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2a49715e49b2891839bf716e121ca434 (12 x TrickBot)
ssdeep 12288:5nZndx1krxFPqBSPN7bQ9k03GxGprGwbKM:9ZdxuQSPN72k034GJGf
Threatray 4'167 similar samples on MalwareBazaar
TLSH T151D4E0213290C032D1A324718E66DBB98E7EB861375265CF3BD90E7D4F24BD1EA3531A
File icon (PE):PE icon
dhash icon 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer)
Reporter zbetcheckin
Tags:32 exe TrickBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
261
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Malware.Fragtor
Status:
Malicious
First seen:
2021-11-05 22:20:09 UTC
AV detection:
6 of 45 (13.33%)
Threat level:
  2/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:lib176 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Trickbot
Malware Config
C2 Extraction:
36.91.117.231:443
36.89.228.201:443
103.75.32.173:443
45.115.172.105:443
36.95.23.89:443
103.123.86.104:443
202.65.119.162:443
202.9.121.143:443
139.255.65.170:443
110.172.137.20:443
103.146.232.154:443
36.91.88.164:443
103.47.170.131:443
122.117.90.133:443
103.9.188.78:443
210.2.149.202:443
118.91.190.42:443
117.222.61.115:443
117.222.57.92:443
136.228.128.21:443
103.47.170.130:443
36.91.186.235:443
103.194.88.4:443
116.206.153.212:443
58.97.72.83:443
139.255.6.2:443
Unpacked files
SH256 hash:
552e2738471d81cc064a26d533e0bda7abb645471fcc5e38368881e437a2d6ce
MD5 hash:
02d583dffcaea4888dae2571bf5b1445
SHA1 hash:
d1501b44c78623596dd18dbf8607e469effa30cc
Detections:
win_trickbot_auto
SH256 hash:
fd2ca05f1fb05028f501bce46ebb5e5131845b8f9e7c710fa527ed5ac0c15bc8
MD5 hash:
534a63969c5c1e6a574a8821a45e2a8e
SHA1 hash:
7a05b2f511ad7a8b4680071e1251942167368219
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TrickBot

Executable exe fd2ca05f1fb05028f501bce46ebb5e5131845b8f9e7c710fa527ed5ac0c15bc8

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-11-05 22:19:47 UTC

url : hxxp://103.124.106.133/images/eflairpany.png