× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: fa9ad80c0977cdbfe8419d27ca9ad909d34f1737df726f4d175f6b85b0670074
File name: 2018-05-16-Trickbot-malware-binary.exe
Detection ratio: 53 / 68
Analysis date: 2018-08-08 09:53:34 UTC ( 1 week, 5 days ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.30810755 20180808
AegisLab Troj.Generickd!c 20180808
AhnLab-V3 Trojan/Win32.Agent.C2521371 20180807
ALYac Trojan.Trickster.Gen 20180808
Antiy-AVL Trojan/Win32.TSGeneric 20180808
Arcabit Trojan.Generic.D1D62283 20180808
Avast Win32:Malware-gen 20180808
AVG Win32:Malware-gen 20180808
Avira (no cloud) TR/TrickBot.zbxgc 20180808
AVware Trojan.Win32.Generic!BT 20180727
BitDefender Trojan.GenericKD.30810755 20180808
Bkav W32.eHeur.Malware08 20180807
CAT-QuickHeal Trojan.Mauvaise.SL1 20180807
ClamAV Win.Trojan.Agent-6546447-0 20180808
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180723
Cylance Unsafe 20180808
Cyren W32/Trojan.UMJD-6220 20180808
DrWeb Trojan.Siggen7.54430 20180808
Emsisoft Trojan.GenericKD.30810755 (B) 20180808
Endgame malicious (high confidence) 20180730
ESET-NOD32 Win32/TrickBot.AQ 20180808
F-Prot W32/Trojan3.AMKR 20180808
F-Secure Trojan.GenericKD.30810755 20180808
Fortinet W32/TrickBot.AQ!tr 20180808
GData Win32.Trojan.Agent.C8FJPB 20180808
Ikarus Trojan-Banker.TrickBot 20180808
Sophos ML heuristic 20180717
K7AntiVirus Trojan ( 0052f20f1 ) 20180808
K7GW Trojan ( 0052f20f1 ) 20180808
Kaspersky Trojan.Win32.Agentb.jaha 20180808
Malwarebytes Trojan.MalPack 20180808
McAfee Generic.ayu 20180808
McAfee-GW-Edition Generic.ayu 20180808
Microsoft Trojan:Win32/Totbrick.H 20180808
eScan Trojan.GenericKD.30810755 20180808
NANO-Antivirus Trojan.Win32.TrickBot.fbzioj 20180808
Palo Alto Networks (Known Signatures) generic.ml 20180808
Panda Trj/WLT.D 20180807
Qihoo-360 Win32/Trojan.BO.f32 20180808
Rising Trojan.Injector!8.C4 (CLOUD) 20180808
SentinelOne (Static ML) static engine - malicious 20180701
Sophos AV Troj/Inject-DHG 20180807
Symantec Trojan.Trickybot 20180808
TrendMicro TROJ_TRICKBOT.USOMON 20180808
TrendMicro-HouseCall TROJ_TRICKBOT.USOMON 20180808
VBA32 Trojan.Totbrick 20180806
VIPRE Trojan.Win32.Generic!BT 20180808
ViRobot Trojan.Win32.Agent.169984.EA 20180808
Webroot W32.Trojan.Gen 20180808
Yandex Trojan.TrickBot! 20180807
Zillya Trojan.Agentb.Win32.19258 20180807
ZoneAlarm by Check Point Trojan.Win32.Agentb.jaha 20180808
Zoner Trojan.Trickbot 20180807
Alibaba 20180713
Avast-Mobile 20180807
Babable 20180725
Baidu 20180808
CMC 20180808
Comodo 20180808
Cybereason 20180225
eGambit 20180808
Jiangmin 20180808
Kingsoft 20180808
MAX 20180808
SUPERAntiSpyware 20180808
Symantec Mobile Insight 20180801
TACHYON 20180808
Tencent 20180808
TheHacker 20180807
TotalDefense 20180808
Trustlook 20180808
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-05-16 08:43:05
Entry Point 0x0000197D
Number of sections 5
PE sections
PE imports
GetLastError
QueryPerformanceCounter
IsDebuggerPresent
GetTickCount
GetModuleFileNameA
GetCurrentProcess
GetCurrentProcessId
UnhandledExceptionFilter
GetProcAddress
InterlockedCompareExchange
GetThreadContext
GetModuleHandleA
InterlockedExchange
SetUnhandledExceptionFilter
GetStartupInfoA
GetSystemTimeAsFileTime
TerminateProcess
ResumeThread
CreateProcessA
VirtualFree
Sleep
GetCurrentThreadId
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
__p__fmode
memset
__dllonexit
_controlfp_s
_invoke_watson
_cexit
?terminate@@YAXXZ
_lock
_onexit
_amsg_exit
_encode_pointer
_XcptFilter
exit
__setusermatherr
_decode_pointer
__p__commode
_adjust_fdiv
_acmdln
_ismbblead
_unlock
_crt_debugger_hook
_except_handler4_common
__getmainargs
_initterm
_initterm_e
_configthreadlocale
_exit
__set_app_type
SendMessageA
CreateWindowExA
InSendMessage
Number of PE resources by type
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:05:16 09:43:05+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
4096

LinkerVersion
9.0

ImageFileCharacteristics
Executable, 32-bit

EntryPoint
0x197d

InitializedDataSize
164864

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
0

File identification
MD5 96985dff8be2912fe2d02752b5d4a073
SHA1 483d8c1e2dfe671eda6dea2fe11ab8a54f8ca0a1
SHA256 fa9ad80c0977cdbfe8419d27ca9ad909d34f1737df726f4d175f6b85b0670074
ssdeep
3072:Rbx/OZbql/eMRiVUV0g0bHV6h/ke1zEpq4KaxnD9RRUQ5l/MQ85Cw5suN:RufEi2V05rVe8eJUq4Ka1RUQT0QgCwO+

authentihash 868cdbb08325d63d8e5876163427f59b084dad4a9fe872806530ff63b2a8559f
imphash b27a49c600bea4c7a8cc82dc3800501e
File size 166.0 KB ( 169984 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (61.7%)
Win32 Dynamic Link Library (generic) (14.7%)
Win32 Executable (generic) (10.0%)
OS/2 Executable (generic) (4.5%)
Generic Win/DOS Executable (4.4%)
Tags
peexe

VirusTotal metadata
First submission 2018-05-16 11:46:53 UTC ( 3 months ago )
Last submission 2018-08-08 09:53:34 UTC ( 1 week, 5 days ago )
File names gobror.bin
2018-05-16-Trickbot-malware-binary.exe
fa9ad80c0977cdbfe8419d27ca9ad909d34f1737df726f4d175f6b85b0670074.bin
96985dff.gxe
gobror.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Created processes
Opened mutexes
Runtime DLLs