General
-
Target
dfcc4ef0873a4bcaadbcda5294198055fd9cbd69e786529d12bd9f73aece8285
-
Size
1.7MB
-
Sample
211207-p73enahdar
-
MD5
485231f714b3439afed298bd9166e025
-
SHA1
d1e85b03fdbe612cbe9cf43fea5ca1b8d1890f90
-
SHA256
dfcc4ef0873a4bcaadbcda5294198055fd9cbd69e786529d12bd9f73aece8285
-
SHA512
94cde480358459f3848e1f10985d1c405be92b9d5b71810c4d17ca0909a25e15479a920a1ab85eee2de66b3143d6bf27ddddfd9d5d59f9ab484e5582cff6edd3
Static task
static1
Malware Config
Extracted
trickbot
100019
rob141
65.152.201.203:443
185.56.175.122:443
46.99.175.217:443
179.189.229.254:443
46.99.175.149:443
181.129.167.82:443
216.166.148.187:443
46.99.188.223:443
128.201.76.252:443
62.99.79.77:443
60.51.47.65:443
24.162.214.166:443
45.36.99.184:443
97.83.40.67:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
-
autorunName:pwgrabbName:pwgrabc
Targets
-
-
Target
dfcc4ef0873a4bcaadbcda5294198055fd9cbd69e786529d12bd9f73aece8285
-
Size
1.7MB
-
MD5
485231f714b3439afed298bd9166e025
-
SHA1
d1e85b03fdbe612cbe9cf43fea5ca1b8d1890f90
-
SHA256
dfcc4ef0873a4bcaadbcda5294198055fd9cbd69e786529d12bd9f73aece8285
-
SHA512
94cde480358459f3848e1f10985d1c405be92b9d5b71810c4d17ca0909a25e15479a920a1ab85eee2de66b3143d6bf27ddddfd9d5d59f9ab484e5582cff6edd3
-
suricata: ET MALWARE Win32/TrickBot CnC Initial Checkin M2
suricata: ET MALWARE Win32/TrickBot CnC Initial Checkin M2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-