General

  • Target

    Documents_66157387_188378863.xls

  • Size

    276KB

  • Sample

    210422-2bm8b76892

  • MD5

    f18b3516539d279662cfe7a779458716

  • SHA1

    c272a9fdc279634826f3cd6bbfaae3fef02782fe

  • SHA256

    0bc8e87eac781658b2c369eceef385c1190055452610848e5e003716464a27f7

  • SHA512

    d78db59ce81bc76e56ea55c66a7510f0ab0e3c15dc40e00622727fba54c349348602c427ae5998caf55528a20a3a6c7c1c835909cb66c271033536e7f5a358cf

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.ottenbourg.com/chester.dll

Extracted

Family

trickbot

Version

2000029

Botnet

che3

C2

103.66.72.217:443

117.252.68.211:443

103.124.173.35:443

115.73.211.230:443

117.54.250.246:443

131.0.112.122:443

102.176.221.78:443

181.176.161.143:443

154.79.251.172:443

103.111.199.76:443

103.54.41.193:443

154.79.244.182:443

154.79.245.158:443

139.255.116.42:443

178.254.161.250:443

178.134.47.166:443

158.181.179.229:443

103.90.197.33:443

109.207.165.40:443

178.72.192.20:443

Attributes
  • autorun
    Name:pwgrab
ecc_pubkey.base64

Targets

    • Target

      Documents_66157387_188378863.xls

    • Size

      276KB

    • MD5

      f18b3516539d279662cfe7a779458716

    • SHA1

      c272a9fdc279634826f3cd6bbfaae3fef02782fe

    • SHA256

      0bc8e87eac781658b2c369eceef385c1190055452610848e5e003716464a27f7

    • SHA512

      d78db59ce81bc76e56ea55c66a7510f0ab0e3c15dc40e00622727fba54c349348602c427ae5998caf55528a20a3a6c7c1c835909cb66c271033536e7f5a358cf

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Templ.dll packer

      Detects Templ.dll packer which usually loads Trickbot.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks