General
-
Target
upl_confirm.xls
-
Size
172KB
-
Sample
210302-nxhnh5466n
-
MD5
00ce55ad01abf387d18d0cf962d1e52e
-
SHA1
e8fb80ea421bbcb8514264320958db9ddea66e00
-
SHA256
2149ef3da4386486a6d3e1a35faa79353bd9e0ee0142447cb3e8a34a9f5ddb02
-
SHA512
c2e167071b29c2eadb06735aebc5eb749d5a0f3c5d65a073b7c02904cb436ee29f237da95f4851e32f631f94bf76211333dc1a291098baf3d0d92e429cede365
Malware Config
Extracted
trickbot
2000026
rob21
154.79.252.132:449
179.191.108.58:449
200.6.169.124:443
103.76.20.226:443
80.78.77.116:449
80.78.75.246:443
45.234.248.66:449
187.190.116.59:443
185.234.72.84:443
36.94.202.131:443
103.91.244.102:449
168.232.188.88:449
103.73.101.98:449
173.81.4.147:449
202.142.151.190:449
118.67.216.238:449
108.170.20.72:443
85.159.214.61:443
36.92.93.5:449
79.122.166.236:449
201.184.190.59:449
111.235.66.83:443
187.19.200.154:449
186.195.199.238:449
103.84.164.87:443
117.212.193.62:449
190.152.71.230:443
37.235.230.123:449
103.119.117.42:443
177.47.88.62:443
103.146.2.152:449
102.164.211.138:449
182.48.66.106:443
178.54.230.164:443
221.176.88.201:449
167.179.194.205:443
179.60.243.52:443
-
autorunName:pwgrab
Targets
-
-
Target
upl_confirm.xls
-
Size
172KB
-
MD5
00ce55ad01abf387d18d0cf962d1e52e
-
SHA1
e8fb80ea421bbcb8514264320958db9ddea66e00
-
SHA256
2149ef3da4386486a6d3e1a35faa79353bd9e0ee0142447cb3e8a34a9f5ddb02
-
SHA512
c2e167071b29c2eadb06735aebc5eb749d5a0f3c5d65a073b7c02904cb436ee29f237da95f4851e32f631f94bf76211333dc1a291098baf3d0d92e429cede365
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Templ.dll packer
Detects Templ.dll packer which usually loads Trickbot.
-
Loads dropped DLL
-