General

  • Target

    3d26dc52c523f01c6f03680e9b476bc03ff093d1c273ff134e8ae43d505ad9c9

  • Size

    368KB

  • Sample

    201115-988yy9n1dn

  • MD5

    1d2542d9aebf664ac77f2b6e09219303

  • SHA1

    1c89ae0e5dfb5eac8d06c4feabfaf714e6877b72

  • SHA256

    3d26dc52c523f01c6f03680e9b476bc03ff093d1c273ff134e8ae43d505ad9c9

  • SHA512

    0a8dd1f27abc9993d4d338a0305d219641d2d0204c4c40ef36cd1a2da34c4ec5c271f929dd9dab0475a004d28e5e26c7689efd5265cf570d4c387f55f4766bd1

Malware Config

Extracted

Family

trickbot

Version

1000213

Botnet

mon1

C2

138.34.32.218:443

86.61.177.139:443

188.124.167.132:449

93.109.242.134:443

62.31.150.202:443

158.58.131.54:443

36.74.100.211:449

66.229.97.133:443

200.111.167.227:449

109.86.227.152:443

85.172.38.59:449

67.162.236.158:443

66.232.212.59:443

80.53.57.146:443

182.253.210.130:449

155.133.31.21:449

176.222.255.2:443

209.121.142.202:449

138.34.32.74:443

209.121.142.214:449

Attributes
  • autorun
    Control:GetSystemInfo
    Name:systeminfo
    Name:injectDll
ecc_pubkey.base64

Targets

    • Target

      3d26dc52c523f01c6f03680e9b476bc03ff093d1c273ff134e8ae43d505ad9c9

    • Size

      368KB

    • MD5

      1d2542d9aebf664ac77f2b6e09219303

    • SHA1

      1c89ae0e5dfb5eac8d06c4feabfaf714e6877b72

    • SHA256

      3d26dc52c523f01c6f03680e9b476bc03ff093d1c273ff134e8ae43d505ad9c9

    • SHA512

      0a8dd1f27abc9993d4d338a0305d219641d2d0204c4c40ef36cd1a2da34c4ec5c271f929dd9dab0475a004d28e5e26c7689efd5265cf570d4c387f55f4766bd1

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot x86 loader

      Detected Trickbot's x86 loader that unpacks the x86 payload.

    • Executes dropped EXE

    • Stops running service(s)

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

1
T1112

Impact

Service Stop

1
T1489

Tasks