General
-
Target
Documents-invoice.iso
-
Size
1.4MB
-
Sample
211021-g267nahhf8
-
MD5
9f83cc7554fa07786628a735391f6455
-
SHA1
4014d32a71fce6a586b6bea5fd62a82df2ba3791
-
SHA256
1ac0a5d6cd95999191d117af62b11ddf8468639541cfdb8d6ddec215c037e001
-
SHA512
d400dd3d87f7a147c94bc3c972fde1354f503e52f82d56ec4cc4451ba9ffb1f0d2087b2c4c22ca6a727d7bc2e60b672cd5d4f170d82f86b42a2f4d4a5b80c418
Static task
static1
Behavioral task
behavioral1
Sample
Documents.lnk
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Documents.lnk
Resource
win10-en-20210920
Behavioral task
behavioral3
Sample
Documents.tmp.dll
Resource
win7-en-20210920
Behavioral task
behavioral4
Sample
Documents.tmp.dll
Resource
win10-en-20211014
Malware Config
Extracted
trickbot
100019
leg1
65.152.201.203:443
185.56.175.122:443
46.99.175.217:443
179.189.229.254:443
46.99.175.149:443
181.129.167.82:443
216.166.148.187:443
46.99.188.223:443
128.201.76.252:443
62.99.79.77:443
60.51.47.65:443
24.162.214.166:443
45.36.99.184:443
97.83.40.67:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
-
autorunName:pwgrabbName:pwgrabc
Targets
-
-
Target
Documents.lnk
-
Size
1KB
-
MD5
0c87cf536140349af097d10fd388e8d8
-
SHA1
a8e880685cf6cce8c3d254de7420649fa4e881b8
-
SHA256
d43f97b1e8bc5537b0820c22abaab7fee4747767464cdfbef6758b678c998331
-
SHA512
63589bfde2c1211553ddd64f4c77c6f3a06a2576edd25aad67936f77735d35152f025c029aeefb2427d12e1eaa565794774f49da131fee7f68829002373b1a2e
-
Deletes itself
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Documents.tmp
-
Size
1.3MB
-
MD5
ac1d4a51b8c1f7f98a1033e5bc2e1de7
-
SHA1
ddaed871b9f95a758b89c856a6d4ccf7751b8103
-
SHA256
7a297e62cd649ae1763acd89bcf2135eebf6b3a910ca60621d84e004b078beb7
-
SHA512
46559ffb39468f79be481bb0078daadb37ba2874e448eb9dafb7e24337ba44aca18cf80c87d942069bfed4bb9fe138f54259f9bd35ec91d000ac79a3df0eac13
-