Summary | ZeroBOX

m142.dll

Trickbot
Category Machine Started Completed
FILE s1_win7_x6401 March 17, 2021, 10:48 a.m. March 17, 2021, 10:48 a.m.
Size 327.5KB
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 e85da3c5a35a887685ff4ce6bb360ade
SHA256 a007bf2037c97f6f4a9c19502c0403b36e02b0c657ab152a661d250a3957fc74
CRC32 B340D0E6
ssdeep 6144:j5Cug2UFF2KDba5eg24xQ7ZV94MFT0R1uwMZ:jbBeEegfxQ7ZV944T0nMZ
Yara
  • PE_Header_Zero - PE File Signature Zero
  • OS_Processor_Check_Zero - OS Processor Check Signature Zero
  • Win_Trojan_Trickbot_Zero - Used Trickbot
  • win_files_operation - Affect private profile
  • IsPE32 - (no description)
  • IsDLL - (no description)
  • IsWindowsGUI - (no description)
  • IsPacked - Entropy Check
  • HasRichSignature - Rich Signature Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

resource name SYNTAX
section {u'size_of_data': u'0x00048a00', u'virtual_address': u'0x0000d000', u'entropy': 7.522153674270484, u'name': u'.rsrc', u'virtual_size': u'0x00048978'} entropy 7.52215367427 description A section with a high entropy has been found
entropy 0.889739663093 description Overall entropy of this PE file is high
Bkav W32.AIDetect.malware1
Elastic malicious (high confidence)
FireEye Generic.mg.e85da3c5a35a8876
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_90% (W)
BitDefenderTheta Gen:NN.ZedlaF.34628.uq8@aWGYpIec
APEX Malicious
Rising Trojan.Trickpak!8.122C7 (TFE:dGZlOgZ9RHOveNaXyg)
McAfee-GW-Edition BehavesLike.Win32.Xiquitir.fc
Microsoft Trojan:Win32/Wacatac.B!ml