General

  • Target

    0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300

  • Size

    546KB

  • Sample

    220530-ecrdssghbn

  • MD5

    9ed548302bc24b6c5a09e397af9d9b77

  • SHA1

    01220ee53b97aabf87d73c276c28bc2ecd4ccb1c

  • SHA256

    0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300

  • SHA512

    94b9a42ea4f4c88a1d1ebfa56a73c560122c09dc6b81a3ea3c1d01f44efeb727843bbebf75f64f79045e7ecbc7a38f4855308fcf7261da4b0e15c45315487ee8

Malware Config

Extracted

Family

trickbot

Version

1000317

Botnet

lib374

C2

107.175.127.149:443

24.247.182.240:449

108.174.120.172:449

107.174.34.202:443

24.247.182.29:449

24.247.182.179:449

97.87.175.152:449

198.46.131.164:443

74.132.135.120:449

198.46.160.217:443

71.94.101.25:443

24.247.182.225:449

192.3.52.107:443

74.140.160.33:449

65.31.241.133:449

140.190.54.187:449

24.247.181.226:449

108.160.196.130:449

23.94.36.143:443

24.247.182.174:449

Attributes
  • autorun
    Control:GetSystemInfo
    Name:systeminfo
    Name:injectDll
    Name:pwgrab
ecc_pubkey.base64

Targets

    • Target

      0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300

    • Size

      546KB

    • MD5

      9ed548302bc24b6c5a09e397af9d9b77

    • SHA1

      01220ee53b97aabf87d73c276c28bc2ecd4ccb1c

    • SHA256

      0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300

    • SHA512

      94b9a42ea4f4c88a1d1ebfa56a73c560122c09dc6b81a3ea3c1d01f44efeb727843bbebf75f64f79045e7ecbc7a38f4855308fcf7261da4b0e15c45315487ee8

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot x86 loader

      Detected Trickbot's x86 loader that unpacks the x86 payload.

    • Executes dropped EXE

    • Stops running service(s)

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Impair Defenses

1
T1562

Modify Registry

1
T1112

Impact

Service Stop

1
T1489

Tasks