General

  • Target

    6132074f9d95f706b97489eb36da5ab47d8d3235b7588d5264a1aefd62de12f2

  • Size

    407KB

  • Sample

    220730-1r8ghsafgj

  • MD5

    a3ec317d309328139331f180fd9f7bdd

  • SHA1

    677328cabd351d8851dd0c4e07c12f32a5cd768a

  • SHA256

    6132074f9d95f706b97489eb36da5ab47d8d3235b7588d5264a1aefd62de12f2

  • SHA512

    1db8625713e5b9be9b108c72338e1cc0d24112df0fb5ea6ef28f7782aca712dc9979021e8e4d481069ce8b924b9efa4dd3e5bbaf3c0742426e477f3a01404c52

Score
10/10

Malware Config

Targets

    • Target

      6132074f9d95f706b97489eb36da5ab47d8d3235b7588d5264a1aefd62de12f2

    • Size

      407KB

    • MD5

      a3ec317d309328139331f180fd9f7bdd

    • SHA1

      677328cabd351d8851dd0c4e07c12f32a5cd768a

    • SHA256

      6132074f9d95f706b97489eb36da5ab47d8d3235b7588d5264a1aefd62de12f2

    • SHA512

      1db8625713e5b9be9b108c72338e1cc0d24112df0fb5ea6ef28f7782aca712dc9979021e8e4d481069ce8b924b9efa4dd3e5bbaf3c0742426e477f3a01404c52

    Score
    10/10
    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot x86 loader

      Detected Trickbot's x86 loader that unpacks the x86 payload.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks