General

  • Target

    b2e0cfae142aa05f01ccd32006c9ac0e3be1f1d2774fcef1847ae36e57288674.bin

  • Size

    19KB

  • Sample

    220126-r9y65aebam

  • MD5

    fbf86df341ad8b1fe2c799016e2c8721

  • SHA1

    8ac6f44c179921105658cb95003cd3d2d0f09f61

  • SHA256

    b2e0cfae142aa05f01ccd32006c9ac0e3be1f1d2774fcef1847ae36e57288674

  • SHA512

    db78261bc620779308b5aab6a02b6af366fceb5b011ae4ce71c18f69f94f463b67707c256f6ba765818ab61a57a882335bd2e6e0c66a20dabdb5a1c5169e25c8

Score
10/10

Malware Config

Extracted

Family

nworm

Version

v0.3.8

C2

66.70.242.36:8080

127.0.0.0:8080

Mutex

0b80e527

Targets

    • Target

      b2e0cfae142aa05f01ccd32006c9ac0e3be1f1d2774fcef1847ae36e57288674.bin

    • Size

      19KB

    • MD5

      fbf86df341ad8b1fe2c799016e2c8721

    • SHA1

      8ac6f44c179921105658cb95003cd3d2d0f09f61

    • SHA256

      b2e0cfae142aa05f01ccd32006c9ac0e3be1f1d2774fcef1847ae36e57288674

    • SHA512

      db78261bc620779308b5aab6a02b6af366fceb5b011ae4ce71c18f69f94f463b67707c256f6ba765818ab61a57a882335bd2e6e0c66a20dabdb5a1c5169e25c8

    Score
    10/10
    • NWorm

      A TrickBot module used to propagate to vulnerable domain controllers.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks