General
-
Target
rymes2
-
Size
594KB
-
Sample
210819-ddqm4a1xex
-
MD5
00cc94bf3a58f8ec8d0be0c36b217efc
-
SHA1
9440839359a2ba5e365df3388caf173846f23cc2
-
SHA256
59ae7ffa61580d4055fc19e9151cd92a4ff9705fea869c4abc1247dba2f97c3d
-
SHA512
3e6af333a647fa7de177dbe4b567b1824c9f8ea444db83ce8d9152bc5169218487fa314d9dd15db1284cac609d9d60b1d8fa56619abea484e67b713f0d3d28f5
Static task
static1
Behavioral task
behavioral1
Sample
rymes2.dll
Resource
win7v20210408
Malware Config
Extracted
trickbot
2000031
zev1
14.232.161.45:443
118.173.233.64:443
41.57.156.203:443
45.239.234.2:443
45.201.136.3:443
177.10.90.29:443
185.17.105.236:443
91.237.161.87:443
185.189.55.207:443
186.225.119.170:443
143.0.208.20:443
222.124.16.74:443
220.82.64.198:443
200.236.218.62:443
178.216.28.59:443
45.239.233.131:443
196.216.59.174:443
119.202.8.249:443
82.159.149.37:443
49.248.217.170:443
181.114.215.239:443
113.160.132.237:443
105.30.26.50:443
202.165.47.106:443
103.122.228.44:443
-
autorunName:pwgrabbName:pwgrabc
Extracted
trickbot
2000032
tot141
103.122.228.44:443
196.216.220.211:443
181.114.215.239:443
41.57.156.203:443
43.252.159.63:443
197.156.129.250:443
113.160.37.196:443
38.110.100.64:443
113.160.132.237:443
24.28.12.23:443
38.110.100.219:443
45.239.233.109:443
119.202.8.249:443
200.236.218.62:443
220.82.64.198:443
190.93.208.53:443
196.216.59.174:443
222.124.16.74:443
202.165.47.106:443
96.9.77.56:443
49.248.217.170:443
186.225.119.170:443
-
autorunName:pwgrabbName:pwgrabc
Targets
-
-
Target
rymes2
-
Size
594KB
-
MD5
00cc94bf3a58f8ec8d0be0c36b217efc
-
SHA1
9440839359a2ba5e365df3388caf173846f23cc2
-
SHA256
59ae7ffa61580d4055fc19e9151cd92a4ff9705fea869c4abc1247dba2f97c3d
-
SHA512
3e6af333a647fa7de177dbe4b567b1824c9f8ea444db83ce8d9152bc5169218487fa314d9dd15db1284cac609d9d60b1d8fa56619abea484e67b713f0d3d28f5
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
suricata: ET MALWARE Trickbot Checkin Response
suricata: ET MALWARE Trickbot Checkin Response
-
suricata: ET MALWARE Win32/Trickbot Data Exfiltration
suricata: ET MALWARE Win32/Trickbot Data Exfiltration
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-