| File name: | bd5a3e59a0296be7aa4b3ab67651c4ae7ee47cf6bc6af2ef1f8b1b14ad3650e4 |
| Full analysis: | https://app.any.run/tasks/a9a5fcbd-9f9c-468a-b0cc-a9682cafdcb8 |
| Verdict: | Malicious activity |
| Threats: | TrickBot is an advanced banking trojan that attackers can use to steal payment credentials from the victims. It can redirect the victim to a fake banking cabinet and retrieve credentials typed in on the webpage. |
| Analysis date: | February 18, 2019, 08:53:34 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | E98EA9C8BA963C6766D6ED3FC189F28F |
| SHA1: | AECDEC9B8973C9597941AD8A99FAFD60E13ACC3C |
| SHA256: | BD5A3E59A0296BE7AA4B3AB67651C4AE7EE47CF6BC6AF2EF1F8B1B14AD3650E4 |
| SSDEEP: | 6144:7yWIGO0uxXTnhljwy6VGF443cx+dt/jv7DOtP4J142JkwSCxFBdNFBgUT:7yWfO0Wbhay6VGK4U+dNDWI42+m1aG |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2015:12:25 20:17:45+01:00 |
| PEType: | PE32 |
| LinkerVersion: | 6.2 |
| CodeSize: | 184832 |
| InitializedDataSize: | 289280 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x29de8 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 25-Dec-2015 19:17:45 |
| Detected languages: |
|
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x000000F0 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 4 |
| Time date stamp: | 25-Dec-2015 19:17:45 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x0002D1D0 | 0x0002D200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.64486 |
.rdata | 0x0002F000 | 0x0000DF1C | 0x0000E000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.13892 |
.data | 0x0003D000 | 0x00009850 | 0x00009800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 6.04436 |
.rsrc | 0x00047000 | 0x0002EF70 | 0x0002F000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.94877 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 4.91161 | 381 | UNKNOWN | UNKNOWN | RT_MANIFEST |
100 | 1.91924 | 20 | UNKNOWN | UNKNOWN | RT_GROUP_ICON |
101 | 6.66654 | 121648 | UNKNOWN | UNKNOWN | RT_BITMAP |
102 | 6.76489 | 60104 | UNKNOWN | UNKNOWN | RT_BITMAP |
103 | 3.07273 | 136 | UNKNOWN | English - United States | RT_MENU |
COMCTL32.dll |
KERNEL32.DLL |
MSVCRT.dll |
SHELL32.dll |
USER32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2196 | C:\Users\admin\AppData\Roaming\winapp\ce6a4f69a0396cf7aa5c4ac67662d5af7ff57dg6cd6ag3fg2g8c2c25ae4660f5.exe | C:\Users\admin\AppData\Roaming\winapp\ce6a4f69a0396cf7aa5c4ac67662d5af7ff57dg6cd6ag3fg2g8c2c25ae4660f5.exe | bd5a3e59a0296be7aa4b3ab67651c4ae7ee47cf6bc6af2ef1f8b1b14ad3650e4.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2932 | C:\Users\admin\AppData\Roaming\winapp\ce6a4f69a0396cf7aa5c4ac67662d5af7ff57dg6cd6ag3fg2g8c2c25ae4660f5.exe | C:\Users\admin\AppData\Roaming\winapp\ce6a4f69a0396cf7aa5c4ac67662d5af7ff57dg6cd6ag3fg2g8c2c25ae4660f5.exe | — | taskeng.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 4294967295 Modules
| |||||||||||||||
| 3092 | "C:\Users\admin\AppData\Local\Temp\bd5a3e59a0296be7aa4b3ab67651c4ae7ee47cf6bc6af2ef1f8b1b14ad3650e4.exe" | C:\Users\admin\AppData\Local\Temp\bd5a3e59a0296be7aa4b3ab67651c4ae7ee47cf6bc6af2ef1f8b1b14ad3650e4.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (2196) ce6a4f69a0396cf7aa5c4ac67662d5af7ff57dg6cd6ag3fg2g8c2c25ae4660f5.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3092 | bd5a3e59a0296be7aa4b3ab67651c4ae7ee47cf6bc6af2ef1f8b1b14ad3650e4.exe | C:\Users\admin\AppData\Roaming\winapp\ce6a4f69a0396cf7aa5c4ac67662d5af7ff57dg6cd6ag3fg2g8c2c25ae4660f5.exe | executable | |
MD5:— | SHA256:— | |||
| 2196 | ce6a4f69a0396cf7aa5c4ac67662d5af7ff57dg6cd6ag3fg2g8c2c25ae4660f5.exe | C:\Users\admin\AppData\Roaming\winapp\client_id | binary | |
MD5:— | SHA256:— | |||
| 2196 | ce6a4f69a0396cf7aa5c4ac67662d5af7ff57dg6cd6ag3fg2g8c2c25ae4660f5.exe | C:\Users\admin\AppData\Roaming\winapp\group_tag | binary | |
MD5:8A28CB8DA1CE9C1E0A91DF18F99ED36E | SHA256:3200D794D013540B0AD33386B0E991B77B951EF5B09AEB8ED03811ECD95850F2 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2196 | ce6a4f69a0396cf7aa5c4ac67662d5af7ff57dg6cd6ag3fg2g8c2c25ae4660f5.exe | GET | 302 | 216.239.32.21:80 | http://myexternalip.com/raw | US | text | 50 b | shared |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2196 | ce6a4f69a0396cf7aa5c4ac67662d5af7ff57dg6cd6ag3fg2g8c2c25ae4660f5.exe | 216.239.32.21:80 | myexternalip.com | Google Inc. | US | whitelisted |
2196 | ce6a4f69a0396cf7aa5c4ac67662d5af7ff57dg6cd6ag3fg2g8c2c25ae4660f5.exe | 216.239.32.21:443 | myexternalip.com | Google Inc. | US | whitelisted |
2196 | ce6a4f69a0396cf7aa5c4ac67662d5af7ff57dg6cd6ag3fg2g8c2c25ae4660f5.exe | 195.133.49.157:443 | — | JSC Mediasoft ekspert | RU | unknown |
Domain | IP | Reputation |
|---|---|---|
myexternalip.com |
| shared |
PID | Process | Class | Message |
|---|---|---|---|
2196 | ce6a4f69a0396cf7aa5c4ac67662d5af7ff57dg6cd6ag3fg2g8c2c25ae4660f5.exe | Potential Corporate Privacy Violation | ET POLICY Possible IP Check myexternalip.com |