General

  • Target

    info_summr_55968-17.bin

  • Size

    210KB

  • Sample

    211021-cvp8cahgd5

  • MD5

    538aaa3cc71057df657b52b8278c35ce

  • SHA1

    e26cd91e5d7693ef3fefd5666e2ff8f1a5338aab

  • SHA256

    342901a3f85cfdb904dc39b2627018e4058545891292b8f90b954d96d986be31

  • SHA512

    0a2558d98b4315eeb3e8e8e5ab7dc8bd9691ef961ff540e55d033c491f37bc3867f914aa38168a6e2bb138033c9c30091d50a659e7ffc5370a5993a64cfddc60

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://185.81.115.23/ytr.dll

Extracted

Family

trickbot

Version

100019

Botnet

sat4

C2

65.152.201.203:443

185.56.175.122:443

46.99.175.217:443

179.189.229.254:443

46.99.175.149:443

181.129.167.82:443

216.166.148.187:443

46.99.188.223:443

128.201.76.252:443

62.99.79.77:443

60.51.47.65:443

24.162.214.166:443

45.36.99.184:443

97.83.40.67:443

184.74.99.214:443

103.105.254.17:443

62.99.76.213:443

82.159.149.52:443

Attributes
  • autorun
    Name:pwgrabb
    Name:pwgrabc
ecc_pubkey.base64

Targets

    • Target

      info_summr_55968-17.bin

    • Size

      210KB

    • MD5

      538aaa3cc71057df657b52b8278c35ce

    • SHA1

      e26cd91e5d7693ef3fefd5666e2ff8f1a5338aab

    • SHA256

      342901a3f85cfdb904dc39b2627018e4058545891292b8f90b954d96d986be31

    • SHA512

      0a2558d98b4315eeb3e8e8e5ab7dc8bd9691ef961ff540e55d033c491f37bc3867f914aa38168a6e2bb138033c9c30091d50a659e7ffc5370a5993a64cfddc60

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks