General

  • Target

    098fae655e3c393db5aeacc97ef1e147a187dacfc78de3735b1fb22ba05cbc0e

  • Size

    720KB

  • Sample

    220201-kcyqrsbeaj

  • MD5

    69aed2636b8acc3268e3bca1e2ff2753

  • SHA1

    5d60e8c042a1c87c5d1690bc1da08be9725dc779

  • SHA256

    098fae655e3c393db5aeacc97ef1e147a187dacfc78de3735b1fb22ba05cbc0e

  • SHA512

    2babac32e4622d6b9c7483e3f7b19809b26b1441ea8e6907b376cbfb7b0c07b00214559adf2bd0fba424c88565d8bfdc4303f8a392c2106e65fdfeb52c0518a2

Malware Config

Extracted

Family

trickbot

Version

1000503

Botnet

tst6

C2

5.182.210.226:443

192.210.226.106:443

51.254.164.244:443

45.148.120.153:443

195.123.239.67:443

194.5.250.150:443

217.12.209.200:443

185.99.2.221:443

51.254.164.245:443

185.62.188.159:443

46.17.107.65:443

185.20.185.76:443

185.203.118.37:443

146.185.253.178:443

185.14.31.252:443

185.99.2.115:443

172.245.156.138:443

51.89.73.158:443

190.214.13.2:449

181.140.173.186:449

Attributes
  • autorun
    Name:pwgrab
ecc_pubkey.base64

Targets

    • Target

      098fae655e3c393db5aeacc97ef1e147a187dacfc78de3735b1fb22ba05cbc0e

    • Size

      720KB

    • MD5

      69aed2636b8acc3268e3bca1e2ff2753

    • SHA1

      5d60e8c042a1c87c5d1690bc1da08be9725dc779

    • SHA256

      098fae655e3c393db5aeacc97ef1e147a187dacfc78de3735b1fb22ba05cbc0e

    • SHA512

      2babac32e4622d6b9c7483e3f7b19809b26b1441ea8e6907b376cbfb7b0c07b00214559adf2bd0fba424c88565d8bfdc4303f8a392c2106e65fdfeb52c0518a2

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Executes dropped EXE

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks