Behavioral task
behavioral1
Sample
6c4609a6655bac0b7a06c570772fbd6d2ef0e8c02ef38e35c10f17c7a245b734.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
6c4609a6655bac0b7a06c570772fbd6d2ef0e8c02ef38e35c10f17c7a245b734.exe
Resource
win10v2004-20220721-en
General
-
Target
6c4609a6655bac0b7a06c570772fbd6d2ef0e8c02ef38e35c10f17c7a245b734
-
Size
114KB
-
MD5
d13f27532e3763fdc015616ba5388c4a
-
SHA1
19bab590540b23a2bcaf9533df8e566ec9512640
-
SHA256
6c4609a6655bac0b7a06c570772fbd6d2ef0e8c02ef38e35c10f17c7a245b734
-
SHA512
b9d598187a29341f64bb612c6e8a350a7a8e496f303c5e026ba75d49b991dfcf977d217aa1477650f86e23ad48e6c18b5c03f63e193fdad8df70230d9ef46cd3
-
SSDEEP
3072:QHPebZNM4SnzebtoRilmoLgk/Ny6TJsOy3T:YDpnloYrk/w6TJ+3
Malware Config
Extracted
trickbot
1000031
3101uk
194.87.146.146:443
37.46.134.189:443
195.133.146.18:443
82.202.236.66:443
195.133.147.149:443
194.87.93.169:443
92.53.78.79:443
95.213.237.224:443
194.87.110.162:443
194.87.102.206:443
92.53.91.59:443
188.120.242.117:443
92.53.77.120:443
185.236.130.97:443
62.109.3.136:443
194.87.103.178:443
212.109.197.115:443
91.240.86.21:443
83.220.168.63:443
91.240.86.137:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
Trickbot family
Files
-
6c4609a6655bac0b7a06c570772fbd6d2ef0e8c02ef38e35c10f17c7a245b734.exe windows x64
b9abc4de5a451c3c5ecdcf2d0487dc05
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_time64
??2@YAPEAX_K@Z
??_V@YAXPEAX@Z
_vsnprintf
exit
memcmp
_itow
_wtoi
rand
__wgetmainargs
__C_specific_handler
_XcptFilter
_exit
_cexit
_wcmdln
_initterm
_amsg_exit
__setusermatherr
_commode
_fmode
__set_app_type
?terminate@@YAXXZ
_CxxThrowException
??1type_info@@UEAA@XZ
tolower
srand
_vsnwprintf
??3@YAXPEAX@Z
memset
memcpy
wcsftime
_localtime64
kernel32
GetLastError
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
GetCurrentProcess
LoadLibraryW
LocalFree
GetVolumeInformationW
GetWindowsDirectoryW
LoadLibraryA
lstrlenW
GetFullPathNameW
GetStartupInfoW
Sleep
TerminateProcess
GetTickCount
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetModuleHandleW
GetProcAddress
advapi32
AdjustTokenPrivileges
ole32
CoInitializeSecurity
CoInitializeEx
oleaut32
SysAllocString
SysFreeString
VariantInit
VariantClear
SysAllocStringLen
winhttp
WinHttpReadData
WinHttpCloseHandle
WinHttpQueryDataAvailable
WinHttpConnect
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpCrackUrl
WinHttpSetTimeouts
WinHttpOpenRequest
WinHttpSetOption
WinHttpSendRequest
WinHttpOpen
ws2_32
freeaddrinfo
WSAStartup
gethostname
getaddrinfo
WSACleanup
Sections
.text Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ