General
-
Target
instruct,09.15.2021.doc
-
Size
68KB
-
Sample
210915-qxxl4aaga4
-
MD5
da6dd1ec05c505614ea31cc043819a64
-
SHA1
639673839cb51e9b199a257eb183e873a169b903
-
SHA256
a91c433f979a24a665b0cb4e6947783f27c4e2bfb48b349c275410d744d26f93
-
SHA512
fadca85027b1cf1453a663780d5f8dc9c8e4521527e82051dd803257486115560bb64d6f8208899e118a7f92a019b9493d97ce72159b9c15272b49ecb4581d0c
Behavioral task
behavioral1
Sample
instruct,09.15.2021.doc
Resource
win7-en
Malware Config
Extracted
trickbot
2000033
zev4
179.42.137.102:443
191.36.152.198:443
179.42.137.104:443
179.42.137.106:443
179.42.137.108:443
202.183.12.124:443
194.190.18.122:443
103.56.207.230:443
171.103.187.218:449
171.103.189.118:449
18.139.111.104:443
179.42.137.105:443
186.4.193.75:443
171.101.229.2:449
179.42.137.107:443
103.56.43.209:449
179.42.137.110:443
45.181.207.156:443
197.44.54.162:449
179.42.137.109:443
103.59.105.226:449
45.181.207.101:443
117.196.236.205:443
72.224.45.102:449
179.42.137.111:443
96.47.239.181:443
171.100.112.190:449
117.196.239.6:443
-
autorunName:pwgrabbName:pwgrabc
Targets
-
-
Target
instruct,09.15.2021.doc
-
Size
68KB
-
MD5
da6dd1ec05c505614ea31cc043819a64
-
SHA1
639673839cb51e9b199a257eb183e873a169b903
-
SHA256
a91c433f979a24a665b0cb4e6947783f27c4e2bfb48b349c275410d744d26f93
-
SHA512
fadca85027b1cf1453a663780d5f8dc9c8e4521527e82051dd803257486115560bb64d6f8208899e118a7f92a019b9493d97ce72159b9c15272b49ecb4581d0c
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-