General

  • Target

    b2cf00e5cdd1f48ac8aa0206ef7344333f1e6e183c2d4e93de02361aa396c440

  • Size

    346KB

  • Sample

    211223-ththnscahq

  • MD5

    d76d2301b09aeb3d257a851cc807274e

  • SHA1

    ba9e3a1058cf211e6d5b4852af0d094b9084e7e7

  • SHA256

    b2cf00e5cdd1f48ac8aa0206ef7344333f1e6e183c2d4e93de02361aa396c440

  • SHA512

    03314e0fa1750162221f7c75cc3f992b9349a2907c0d9a499fa7b2e32fb059ef4544b80cb36d4c5a61f9af3e195b9e5ee287ad069793d88df9c31abe090b8d61

Malware Config

Extracted

Family

trickbot

Version

100021

Botnet

rob144

C2

181.129.85.98:443

189.112.119.205:443

189.51.118.78:443

186.121.214.106:443

49.176.188.184:443

61.69.102.170:443

213.32.252.221:443

89.46.216.2:443

103.36.79.3:443

103.108.97.51:443

95.140.217.242:443

41.175.22.226:443

190.109.169.161:443

186.159.12.18:443

190.109.171.17:443

181.196.148.202:443

186.47.75.58:443

186.42.212.30:443

190.214.21.14:443

187.108.32.133:443

Attributes
  • autorun

ecc_pubkey.base64

Targets

    • Target

      b2cf00e5cdd1f48ac8aa0206ef7344333f1e6e183c2d4e93de02361aa396c440

    • Size

      346KB

    • MD5

      d76d2301b09aeb3d257a851cc807274e

    • SHA1

      ba9e3a1058cf211e6d5b4852af0d094b9084e7e7

    • SHA256

      b2cf00e5cdd1f48ac8aa0206ef7344333f1e6e183c2d4e93de02361aa396c440

    • SHA512

      03314e0fa1750162221f7c75cc3f992b9349a2907c0d9a499fa7b2e32fb059ef4544b80cb36d4c5a61f9af3e195b9e5ee287ad069793d88df9c31abe090b8d61

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • suricata: ET MALWARE Win32/TrickBot CnC Initial Checkin M2

      suricata: ET MALWARE Win32/TrickBot CnC Initial Checkin M2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks