General

  • Target

    9957fe40ae9a7a2630593fd82544d4ea39ca47d7

  • Size

    672KB

  • Sample

    191018-pjatzgm2xn

  • MD5

    418788feea94e59df9773d5237eb762c

  • SHA1

    9957fe40ae9a7a2630593fd82544d4ea39ca47d7

  • SHA256

    0544789e0e878b3e32334ad2119e39a7fa2e6ae3f3cd5c11f3bc53a24311053d

  • SHA512

    f94bf301f84aeb8cb1a006bff40d896a3e6470e81eabaeade4f62593c616ea053df8b46f5a366a3075f09a1124fa2fa738db8ce01c3957faaccee0b5831071cd

Score
10/10

Malware Config

Targets

    • Target

      9957fe40ae9a7a2630593fd82544d4ea39ca47d7

    • Size

      672KB

    • MD5

      418788feea94e59df9773d5237eb762c

    • SHA1

      9957fe40ae9a7a2630593fd82544d4ea39ca47d7

    • SHA256

      0544789e0e878b3e32334ad2119e39a7fa2e6ae3f3cd5c11f3bc53a24311053d

    • SHA512

      f94bf301f84aeb8cb1a006bff40d896a3e6470e81eabaeade4f62593c616ea053df8b46f5a366a3075f09a1124fa2fa738db8ce01c3957faaccee0b5831071cd

    Score
    10/10
    • Trickbot persistence files

    • trickbot family

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks system information in the registry (likely anti-VM)

    • Modifies service

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Tasks