General

  • Target

    doc1 (33).xlsm

  • Size

    130KB

  • Sample

    211019-r8rewsghfr

  • MD5

    dc05be7a3a80a8361cebded08ba1ad6f

  • SHA1

    aa145cd9773b10c5b9967c65d80ec4c92115e745

  • SHA256

    056e1bdd3bc59bce465cfcea4bff39876b99086757e5b3f31df9c12e5b7cab31

  • SHA512

    2efee02da4c63f4c08adb95c3ada96f31144752f1413829d28df353b3d0118cd89bc70c1bc20f47997f324afc162f533522f59b0681eb279591ded59e3bc9d6e

Malware Config

Extracted

Family

trickbot

Version

100019

Botnet

rob136

C2

65.152.201.203:443

185.56.175.122:443

46.99.175.217:443

179.189.229.254:443

46.99.175.149:443

181.129.167.82:443

216.166.148.187:443

46.99.188.223:443

128.201.76.252:443

62.99.79.77:443

60.51.47.65:443

24.162.214.166:443

45.36.99.184:443

97.83.40.67:443

184.74.99.214:443

103.105.254.17:443

62.99.76.213:443

82.159.149.52:443

Attributes
  • autorun
    Name:pwgrabb
    Name:pwgrabc
ecc_pubkey.base64

Targets

    • Target

      doc1 (33).xlsm

    • Size

      130KB

    • MD5

      dc05be7a3a80a8361cebded08ba1ad6f

    • SHA1

      aa145cd9773b10c5b9967c65d80ec4c92115e745

    • SHA256

      056e1bdd3bc59bce465cfcea4bff39876b99086757e5b3f31df9c12e5b7cab31

    • SHA512

      2efee02da4c63f4c08adb95c3ada96f31144752f1413829d28df353b3d0118cd89bc70c1bc20f47997f324afc162f533522f59b0681eb279591ded59e3bc9d6e

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks