General
-
Target
Attach_589256204_214472970.xls
-
Size
141KB
-
Sample
210224-998c949gda
-
MD5
fa7354227422a339d34d662839e0aee2
-
SHA1
09c5bb8db08c53f00745262ba414fa093d6dd7f9
-
SHA256
d70803dc31e45825416b5391969ab9042baa17c01e080382a4340cef54090c84
-
SHA512
48db1f5701e12f2e2cebc6aa852673d1a93598ed77c93dc6251270824fb11ac958315c8f3443edf2329c096b0149cdce48d94c30556113d9606df8856f5e8c43
Behavioral task
behavioral1
Sample
Attach_589256204_214472970.xls
Resource
win7v20201028
Malware Config
Extracted
http://bearcatpumps.com.cn/css/tolkio.php
Extracted
trickbot
2000026
rob16
154.79.252.132:449
179.191.108.58:449
200.6.169.124:443
103.76.20.226:443
80.78.77.116:449
80.78.75.246:443
45.234.248.66:449
187.190.116.59:443
185.234.72.84:443
36.94.202.131:443
103.91.244.102:449
168.232.188.88:449
103.73.101.98:449
173.81.4.147:449
202.142.151.190:449
118.67.216.238:449
108.170.20.72:443
85.159.214.61:443
36.92.93.5:449
79.122.166.236:449
201.184.190.59:449
111.235.66.83:443
187.19.200.154:449
186.195.199.238:449
103.84.164.87:443
117.212.193.62:449
190.152.71.230:443
37.235.230.123:449
103.119.117.42:443
177.47.88.62:443
103.146.2.152:449
102.164.211.138:449
182.48.66.106:443
178.54.230.164:443
221.176.88.201:449
167.179.194.205:443
179.60.243.52:443
-
autorunName:pwgrab
Targets
-
-
Target
Attach_589256204_214472970.xls
-
Size
141KB
-
MD5
fa7354227422a339d34d662839e0aee2
-
SHA1
09c5bb8db08c53f00745262ba414fa093d6dd7f9
-
SHA256
d70803dc31e45825416b5391969ab9042baa17c01e080382a4340cef54090c84
-
SHA512
48db1f5701e12f2e2cebc6aa852673d1a93598ed77c93dc6251270824fb11ac958315c8f3443edf2329c096b0149cdce48d94c30556113d9606df8856f5e8c43
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Templ.dll packer
Detects Templ.dll packer which usually loads Trickbot.
-
Loads dropped DLL
-