MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ff6554ab27fa28c602add0c4824a651b42f0d9b45e7d0a758ba66e2e650598db. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: ff6554ab27fa28c602add0c4824a651b42f0d9b45e7d0a758ba66e2e650598db
SHA3-384 hash: 11753072d5dad0b690abddc121ade8aed347763bbb557d9cea5a9d5e9245209d248753ed9f7204fe77a69e0ed3c73382
SHA1 hash: 51b17236d40ef2c354916d6f758191b3128bf58d
MD5 hash: 75378e60ba4f150d6adb5468edef655b
humanhash: green-august-march-foxtrot
File name:mon102.dll
Download: download sample
Signature TrickBot
File size:602'112 bytes
First seen:2021-03-03 23:33:07 UTC
Last seen:2021-03-04 08:15:25 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 797384ad59f07b968b9c5c867c00b02f (3 x TrickBot)
ssdeep 12288:N7fcBXTEC7wfnmB/fjOFSd20Kdo1Ky+rMOW1wA86SzEkNtEQFB:oEC7h8u2xdo1Ky+gpBWzZ3FB
Threatray 2 similar samples on MalwareBazaar
TLSH F9D4CF13B6E28135E5AF02343E656B79A2FDFA509DF6C68777C0CA1C5D31A01CA1632B
Reporter Cryptolaemus1
Tags:dll mon102 TrickBot

Intelligence


File Origin
# of uploads :
2
# of downloads :
163
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Sending a UDP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
clean
Classification:
n/a
Score:
6 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.TrickBot
Status:
Malicious
First seen:
2021-03-03 23:34:05 UTC
File Type:
PE (Dll)
Extracted files:
26
AV detection:
13 of 48 (27.08%)
Threat level:
  5/5
Result
Malware family:
trickbot
Score:
  10/10
Tags:
family:trickbot botnet:mon102 banker trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Templ.dll packer
Trickbot
Malware Config
C2 Extraction:
103.225.138.94:449
122.2.28.70:449
123.200.26.246:449
131.255.106.152:449
142.112.79.223:449
154.126.176.30:449
180.92.238.186:449
187.20.217.129:449
201.20.118.122:449
202.91.41.138:449
95.210.118.90:449
Unpacked files
SH256 hash:
30928418e780f5a2ffce6e4e00d637faf1da9135043c9dd6ff36a7e41ae47a99
MD5 hash:
d20aef24522d4da1f9aa6c2bb8d2ac50
SHA1 hash:
e2221f3ad963bd2bd0f210f59fc5f9dbd1ca8897
SH256 hash:
3a95a9a32c478c795760bb027f1a286b5cee37059dab71c31e0001ab8d45833b
MD5 hash:
dd1d4089e107eefe2c27be4e1f7f4f97
SHA1 hash:
ab934b56c4a391928304b5c3ef9ade98d3cf8c1d
Detections:
win_trickbot_a4 win_trickbot_g6 win_trickbot_auto
SH256 hash:
2a280be8eccc134f735f2d1a6e46c880f4087c8a2d34b84e54ff3ca88cb32c14
MD5 hash:
ef71da5cc81c6971d49d98e32c4b28b8
SHA1 hash:
6c42fa3d5841662551e7581824f2d0eb6f9ea82d
SH256 hash:
ff6554ab27fa28c602add0c4824a651b42f0d9b45e7d0a758ba66e2e650598db
MD5 hash:
75378e60ba4f150d6adb5468edef655b
SHA1 hash:
51b17236d40ef2c354916d6f758191b3128bf58d
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments