General

  • Target

    df8de65b3cce5e60de0564665a4c27283b70226e3341c455c10f0df7712413b3

  • Size

    516KB

  • Sample

    220701-e49dpacbbr

  • MD5

    e18c9d414140f2cde7ae1151489f65b6

  • SHA1

    79ed070d71ab2bf5ef7a669a328624e4e5c898b5

  • SHA256

    df8de65b3cce5e60de0564665a4c27283b70226e3341c455c10f0df7712413b3

  • SHA512

    78fd08a6b2e3b9d9adb74a947225d3d49bc91bdc713a20dadf19f658eb985a39b8699d68844e46f5d72907edca95dbc05cf347ed7cf86f32720a280475c7a4e2

Malware Config

Extracted

Family

trickbot

Version

1000293

Botnet

lib346

C2

51.68.170.58:443

68.3.14.71:443

174.105.235.178:449

195.54.162.247:443

181.113.17.230:449

174.105.233.82:449

66.60.121.58:449

207.140.14.141:443

42.115.91.177:443

5.189.224.254:443

71.94.101.25:443

206.130.141.255:449

74.140.160.33:449

65.31.241.133:449

140.190.54.187:449

75.102.135.23:449

24.119.69.70:449

85.143.223.51:443

103.110.91.118:449

68.4.173.10:443

Attributes
  • autorun
    Control:GetSystemInfo
    Name:systeminfo
    Name:injectDll
    Name:pwgrab
ecc_pubkey.base64

Targets

    • Target

      df8de65b3cce5e60de0564665a4c27283b70226e3341c455c10f0df7712413b3

    • Size

      516KB

    • MD5

      e18c9d414140f2cde7ae1151489f65b6

    • SHA1

      79ed070d71ab2bf5ef7a669a328624e4e5c898b5

    • SHA256

      df8de65b3cce5e60de0564665a4c27283b70226e3341c455c10f0df7712413b3

    • SHA512

      78fd08a6b2e3b9d9adb74a947225d3d49bc91bdc713a20dadf19f658eb985a39b8699d68844e46f5d72907edca95dbc05cf347ed7cf86f32720a280475c7a4e2

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot x86 loader

      Detected Trickbot's x86 loader that unpacks the x86 payload.

    • Executes dropped EXE

    • Stops running service(s)

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Impair Defenses

1
T1562

Modify Registry

1
T1112

Impact

Service Stop

1
T1489

Tasks