General
-
Target
deed contract,09.21.doc
-
Size
69KB
-
Sample
210913-vsrx9shcbk
-
MD5
f609155a19b0b0ab6cbe75bc3cee1496
-
SHA1
b45528f88e07f7db0954d427d43832237c29dee5
-
SHA256
9daf33d2d3b122f8caccbca555164e11046957ed0af5afbb2b243a292d6f2de2
-
SHA512
e735d121b854d761104c5987c35e64e4033dc47834a81f139f511345fcb04e2b8cc14343c33f369c6093b3540ca934569dde7e96040f9ceeb3dddef73f15a2f8
Behavioral task
behavioral1
Sample
deed contract,09.21.doc
Resource
win7-en
Behavioral task
behavioral2
Sample
deed contract,09.21.doc
Resource
win10-en
Malware Config
Extracted
trickbot
2000033
zem1
179.42.137.102:443
191.36.152.198:443
179.42.137.104:443
179.42.137.106:443
179.42.137.108:443
202.183.12.124:443
194.190.18.122:443
103.56.207.230:443
171.103.187.218:449
171.103.189.118:449
18.139.111.104:443
179.42.137.105:443
186.4.193.75:443
171.101.229.2:449
179.42.137.107:443
103.56.43.209:449
179.42.137.110:443
45.181.207.156:443
197.44.54.162:449
179.42.137.109:443
103.59.105.226:449
45.181.207.101:443
117.196.236.205:443
72.224.45.102:449
179.42.137.111:443
96.47.239.181:443
171.100.112.190:449
117.196.239.6:443
-
autorunName:pwgrabbName:pwgrabc
Targets
-
-
Target
deed contract,09.21.doc
-
Size
69KB
-
MD5
f609155a19b0b0ab6cbe75bc3cee1496
-
SHA1
b45528f88e07f7db0954d427d43832237c29dee5
-
SHA256
9daf33d2d3b122f8caccbca555164e11046957ed0af5afbb2b243a292d6f2de2
-
SHA512
e735d121b854d761104c5987c35e64e4033dc47834a81f139f511345fcb04e2b8cc14343c33f369c6093b3540ca934569dde7e96040f9ceeb3dddef73f15a2f8
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-