General
-
Target
currCurrPl.hta
-
Size
2KB
-
Sample
210913-vsj8eshcbj
-
MD5
29218d420ce0c0f84c301c035801f6ff
-
SHA1
e61258fb5fc9ce9b814b276298885fee5e16083d
-
SHA256
d869fccdb3807528fb62cabc388d4ad9da641fc3354c4432ce2a93ce99e43d3c
-
SHA512
591ee976ab70304faf1283dedea6101cd0b592560984dd60d70e5aabd0e20bb1e24e8f281414a51f7eff842802bd1901b118170431b50720cfad80e4e0c29ea3
Static task
static1
Behavioral task
behavioral1
Sample
currCurrPl.hta
Resource
win7-en
Behavioral task
behavioral2
Sample
currCurrPl.hta
Resource
win10v20210408
Malware Config
Extracted
trickbot
2000033
zem1
179.42.137.102:443
191.36.152.198:443
179.42.137.104:443
179.42.137.106:443
179.42.137.108:443
202.183.12.124:443
194.190.18.122:443
103.56.207.230:443
171.103.187.218:449
171.103.189.118:449
18.139.111.104:443
179.42.137.105:443
186.4.193.75:443
171.101.229.2:449
179.42.137.107:443
103.56.43.209:449
179.42.137.110:443
45.181.207.156:443
197.44.54.162:449
179.42.137.109:443
103.59.105.226:449
45.181.207.101:443
117.196.236.205:443
72.224.45.102:449
179.42.137.111:443
96.47.239.181:443
171.100.112.190:449
117.196.239.6:443
-
autorunName:pwgrabbName:pwgrabc
Targets
-
-
Target
currCurrPl.hta
-
Size
2KB
-
MD5
29218d420ce0c0f84c301c035801f6ff
-
SHA1
e61258fb5fc9ce9b814b276298885fee5e16083d
-
SHA256
d869fccdb3807528fb62cabc388d4ad9da641fc3354c4432ce2a93ce99e43d3c
-
SHA512
591ee976ab70304faf1283dedea6101cd0b592560984dd60d70e5aabd0e20bb1e24e8f281414a51f7eff842802bd1901b118170431b50720cfad80e4e0c29ea3
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-