General
-
Target
saved.png
-
Size
432KB
-
Sample
210105-jcxqfsw6r2
-
MD5
0739c8b902eb6b89666d31b744eeb90e
-
SHA1
64cb9f5da3ddc769b438c43b994e47487c744cd2
-
SHA256
ed8dea5381a7f6c78108a04344dc73d5669690b7ecfe6e44b2c61687a2306785
-
SHA512
5c73dca3565e08fba8ad42676237dfe0241a241187cfa2548551ae041569d03886fee580f708e3c43b3dc8e04352a111f2747a6b1d07306764084817ddab3363
Static task
static1
Behavioral task
behavioral1
Sample
saved.png.exe
Resource
win7v20201028
Malware Config
Extracted
trickbot
100009
tot5
149.54.11.54:449
36.89.191.119:449
41.159.31.227:449
103.150.68.124:449
103.126.185.7:449
103.112.145.58:449
103.110.53.174:449
102.164.208.44:449
194.5.249.143:443
142.202.191.175:443
195.123.241.31:443
45.89.125.214:443
45.83.151.103:443
91.200.103.41:443
66.70.246.0:443
64.74.160.218:443
198.46.198.115:443
5.34.180.173:443
23.227.196.5:443
195.123.241.115:443
107.152.42.163:443
-
autorunName:pwgrab
Targets
-
-
Target
saved.png
-
Size
432KB
-
MD5
0739c8b902eb6b89666d31b744eeb90e
-
SHA1
64cb9f5da3ddc769b438c43b994e47487c744cd2
-
SHA256
ed8dea5381a7f6c78108a04344dc73d5669690b7ecfe6e44b2c61687a2306785
-
SHA512
5c73dca3565e08fba8ad42676237dfe0241a241187cfa2548551ae041569d03886fee580f708e3c43b3dc8e04352a111f2747a6b1d07306764084817ddab3363
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-