General

  • Target

    dcc8899f69465e9c808dc7f89cf57edd.exe

  • Size

    602KB

  • Sample

    210113-jjxz21ylza

  • MD5

    dcc8899f69465e9c808dc7f89cf57edd

  • SHA1

    59b189569e206f7b44c9201de1558fde38b938cc

  • SHA256

    d0dbb5a854ad3b26d2b7bdf00a04e2823f01cf1ddb897adced183d6f8a70cfda

  • SHA512

    db3c58bff773fb0ce555230a530afdbace75d45d18042ffb7d7fb51e86b407c5c1f7f9ee890e31cb33d988632e8e7c458040fde1386968da01c1652d2ea75cf4

Malware Config

Extracted

Family

trickbot

Version

100010

Botnet

rob35

C2

5.34.180.180:443

64.74.160.228:443

198.46.198.116:443

5.34.180.185:443

107.152.46.188:443

195.123.241.214:443

23.254.224.2:443

107.172.188.113:443

200.52.147.93:443

185.198.59.45:443

45.14.226.101:443

185.82.126.38:443

85.204.116.139:443

45.155.173.248:443

103.91.244.50:443

45.230.244.20:443

45.226.124.226:443

187.84.95.6:443

186.250.157.116:443

186.137.85.76:443

Attributes
  • autorun
    Name:pwgrab
ecc_pubkey.base64
ecc_pubkey.base64

Targets

    • Target

      dcc8899f69465e9c808dc7f89cf57edd.exe

    • Size

      602KB

    • MD5

      dcc8899f69465e9c808dc7f89cf57edd

    • SHA1

      59b189569e206f7b44c9201de1558fde38b938cc

    • SHA256

      d0dbb5a854ad3b26d2b7bdf00a04e2823f01cf1ddb897adced183d6f8a70cfda

    • SHA512

      db3c58bff773fb0ce555230a530afdbace75d45d18042ffb7d7fb51e86b407c5c1f7f9ee890e31cb33d988632e8e7c458040fde1386968da01c1652d2ea75cf4

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks