General

  • Target

    59c9f346_by_Libranalysis

  • Size

    277KB

  • Sample

    210512-wt8gzx3dhj

  • MD5

    59c9f3469b577cd8c4846cdf4d5e6695

  • SHA1

    4c7d119d29cbd08d0824c8794adf98b3d9151d2f

  • SHA256

    ecaba5d26b33586004c7de1821495e231a7c357a222715e9df199d969e2e9c58

  • SHA512

    349970a7f904b567982449a8f628d5e8881872c64893739581cc8b2d476ba47cf9187b4626a167adfa05520997122fe3c60e58eb444dd65c69efce41e93eebad

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://koneckotechnology.com/netmons.dll

Extracted

Family

trickbot

Version

2000029

Botnet

net15

C2

103.66.72.217:443

117.252.68.211:443

103.124.173.35:443

115.73.211.230:443

117.54.250.246:443

131.0.112.122:443

102.176.221.78:443

181.176.161.143:443

154.79.251.172:443

103.111.199.76:443

103.54.41.193:443

154.79.244.182:443

154.79.245.158:443

139.255.116.42:443

178.254.161.250:443

178.134.47.166:443

158.181.179.229:443

103.90.197.33:443

109.207.165.40:443

178.72.192.20:443

Attributes
  • autorun
    Name:pwgrabb
    Name:pwgrabc
ecc_pubkey.base64

Targets

    • Target

      59c9f346_by_Libranalysis

    • Size

      277KB

    • MD5

      59c9f3469b577cd8c4846cdf4d5e6695

    • SHA1

      4c7d119d29cbd08d0824c8794adf98b3d9151d2f

    • SHA256

      ecaba5d26b33586004c7de1821495e231a7c357a222715e9df199d969e2e9c58

    • SHA512

      349970a7f904b567982449a8f628d5e8881872c64893739581cc8b2d476ba47cf9187b4626a167adfa05520997122fe3c60e58eb444dd65c69efce41e93eebad

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Templ.dll packer

      Detects Templ.dll packer which usually loads Trickbot.

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks