General

  • Target

    RNP-00149.xlsm

  • Size

    87KB

  • Sample

    211021-sk6eksaea3

  • MD5

    dc44a89cc099adc3042727734525e5ca

  • SHA1

    343ab78089a5e242c29095ff55833b5c1da4181f

  • SHA256

    d3fd3711c2dcff75bf015624ac6ac8f258fbd0229cf7cd4cb5f4eaba6ec32033

  • SHA512

    bf67308fdecafe0b9b37679092d0ad64692a7a61afd84068b5c2cbb9cceac2799b201c41c3be14821fecb943cd5508e37251b60458d0b7ce472aca2dceb89f94

Malware Config

Extracted

Family

trickbot

Version

100019

Botnet

rob136

C2

65.152.201.203:443

185.56.175.122:443

46.99.175.217:443

179.189.229.254:443

46.99.175.149:443

181.129.167.82:443

216.166.148.187:443

46.99.188.223:443

128.201.76.252:443

62.99.79.77:443

60.51.47.65:443

24.162.214.166:443

45.36.99.184:443

97.83.40.67:443

184.74.99.214:443

103.105.254.17:443

62.99.76.213:443

82.159.149.52:443

Attributes
  • autorun
    Name:pwgrabb
    Name:pwgrabc
ecc_pubkey.base64

Targets

    • Target

      RNP-00149.xlsm

    • Size

      87KB

    • MD5

      dc44a89cc099adc3042727734525e5ca

    • SHA1

      343ab78089a5e242c29095ff55833b5c1da4181f

    • SHA256

      d3fd3711c2dcff75bf015624ac6ac8f258fbd0229cf7cd4cb5f4eaba6ec32033

    • SHA512

      bf67308fdecafe0b9b37679092d0ad64692a7a61afd84068b5c2cbb9cceac2799b201c41c3be14821fecb943cd5508e37251b60458d0b7ce472aca2dceb89f94

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks