General

  • Target

    SecuriteInfo.com.Heur.10838.2618

  • Size

    274KB

  • Sample

    210504-mzl4baq6mn

  • MD5

    219a612b8cf85f5fecbb7e6e27ae0e47

  • SHA1

    a846e68a6d927ec6ea41b0958c20f02fed066842

  • SHA256

    3cd2b72f85d145e8bfc5fadc184e97d6d102e3b22a45815358c43538c9c1dc18

  • SHA512

    a3f3e0d70470b7766b849dda892e38def8378c9d76dc4165bef4927ae6fd4dfefc1551391719a637ba2b188e6d1ebdc484f6b5f87b4c19195e86ea43274c2939

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://parkisolutions.com/nerugin.dll

Extracted

Family

trickbot

Version

2000029

Botnet

net10

C2

103.66.72.217:443

117.252.68.211:443

103.124.173.35:443

115.73.211.230:443

117.54.250.246:443

131.0.112.122:443

102.176.221.78:443

181.176.161.143:443

154.79.251.172:443

103.111.199.76:443

103.54.41.193:443

154.79.244.182:443

154.79.245.158:443

139.255.116.42:443

178.254.161.250:443

178.134.47.166:443

158.181.179.229:443

103.90.197.33:443

109.207.165.40:443

178.72.192.20:443

Attributes
  • autorun
    Name:pwgrabb
    Name:pwgrabc
ecc_pubkey.base64

Targets

    • Target

      SecuriteInfo.com.Heur.10838.2618

    • Size

      274KB

    • MD5

      219a612b8cf85f5fecbb7e6e27ae0e47

    • SHA1

      a846e68a6d927ec6ea41b0958c20f02fed066842

    • SHA256

      3cd2b72f85d145e8bfc5fadc184e97d6d102e3b22a45815358c43538c9c1dc18

    • SHA512

      a3f3e0d70470b7766b849dda892e38def8378c9d76dc4165bef4927ae6fd4dfefc1551391719a637ba2b188e6d1ebdc484f6b5f87b4c19195e86ea43274c2939

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Templ.dll packer

      Detects Templ.dll packer which usually loads Trickbot.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks