General

  • Target

    Form_1099_5715537.xls

  • Size

    90KB

  • Sample

    200707-shx6pajz2a

  • MD5

    d1bda4049e740009dff39fe1698cb00a

  • SHA1

    efc17b6d5cdd51832d90a71b7cfdea7248473d44

  • SHA256

    2e0487c6cbecd68c83166ebf8742f9784be52dba4d77d37a359bacb33790cb76

  • SHA512

    af682858aea2df8b9a94f97d630a4702c4c3fdb0e688f438b6495408efea3a352b6fc01427d27d17a0fe9f85c028f8ae6fa2a3653c63670c18f0ef865838db54

Malware Config

Extracted

Family

trickbot

Version

1000512

Botnet

chil61

C2

95.171.16.42:443

185.90.61.9:443

5.1.81.68:443

185.99.2.65:443

134.119.191.11:443

85.204.116.100:443

78.108.216.47:443

51.81.112.144:443

194.5.250.121:443

185.14.31.104:443

185.99.2.66:443

107.175.72.141:443

192.3.247.123:443

134.119.191.21:443

85.204.116.216:443

91.235.129.20:443

181.129.104.139:449

181.112.157.42:449

181.129.134.18:449

131.161.253.190:449

Attributes
  • autorun
    Name:pwgrab
ecc_pubkey.base64

Targets

    • Target

      Form_1099_5715537.xls

    • Size

      90KB

    • MD5

      d1bda4049e740009dff39fe1698cb00a

    • SHA1

      efc17b6d5cdd51832d90a71b7cfdea7248473d44

    • SHA256

      2e0487c6cbecd68c83166ebf8742f9784be52dba4d77d37a359bacb33790cb76

    • SHA512

      af682858aea2df8b9a94f97d630a4702c4c3fdb0e688f438b6495408efea3a352b6fc01427d27d17a0fe9f85c028f8ae6fa2a3653c63670c18f0ef865838db54

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Templ.dll packer

      Detects Templ.dll packer which usually loads Trickbot.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks