General
-
Target
upl_confirm.xls
-
Size
995KB
-
Sample
210302-rm23f9xkwn
-
MD5
81d961fd1967f6ded990fefbd7366ad0
-
SHA1
bf7168f9f7bfa16c1d98c72c44e2c0782dd66896
-
SHA256
5249e43b972f40a78393ddc43b32e444c5ff30bd068078e63112a9da85abfcd5
-
SHA512
12424620354c054659ef473432ebc0d44712810aacd0a2050c7bf0319d139d833ec03fb0ecb2b20a03777d3ba11b93dc5e6884777187ddd8d9644988f2ba5b3c
Static task
static1
Malware Config
Extracted
trickbot
2000026
rob21
154.79.252.132:449
179.191.108.58:449
200.6.169.124:443
103.76.20.226:443
80.78.77.116:449
80.78.75.246:443
45.234.248.66:449
187.190.116.59:443
185.234.72.84:443
36.94.202.131:443
103.91.244.102:449
168.232.188.88:449
103.73.101.98:449
173.81.4.147:449
202.142.151.190:449
118.67.216.238:449
108.170.20.72:443
85.159.214.61:443
36.92.93.5:449
79.122.166.236:449
201.184.190.59:449
111.235.66.83:443
187.19.200.154:449
186.195.199.238:449
103.84.164.87:443
117.212.193.62:449
190.152.71.230:443
37.235.230.123:449
103.119.117.42:443
177.47.88.62:443
103.146.2.152:449
102.164.211.138:449
182.48.66.106:443
178.54.230.164:443
221.176.88.201:449
167.179.194.205:443
179.60.243.52:443
-
autorunName:pwgrab
Targets
-
-
Target
upl_confirm.xls
-
Size
995KB
-
MD5
81d961fd1967f6ded990fefbd7366ad0
-
SHA1
bf7168f9f7bfa16c1d98c72c44e2c0782dd66896
-
SHA256
5249e43b972f40a78393ddc43b32e444c5ff30bd068078e63112a9da85abfcd5
-
SHA512
12424620354c054659ef473432ebc0d44712810aacd0a2050c7bf0319d139d833ec03fb0ecb2b20a03777d3ba11b93dc5e6884777187ddd8d9644988f2ba5b3c
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Templ.dll packer
Detects Templ.dll packer which usually loads Trickbot.
-
Modifies WinLogon to allow AutoLogon
Enables rebooting of the machine without requiring login credentials.
-
Loads dropped DLL
-