General

  • Target

    2920-23-0x00000000000E0000-0x0000000000104000-memory.dmp

  • Size

    144KB

  • Sample

    230824-jp2shsba49

  • MD5

    730305fbb487803051bc5a90686ed438

  • SHA1

    cc37a48b11959915fe1f7fbde728b2cea1e9968b

  • SHA256

    0ec0b262d5b58cf8aaf0ab5ea3ffd7649e4815f1d9c8e395c6cdf5b3a56307c6

  • SHA512

    fc3a8d66d97c81ce24f05887e7ec375e6a563dae18e0017f0e0707a937631727ce7163cc2375275ed2733578e9d048cf2356d70a5ab7f4335d9057167aa9664e

  • SSDEEP

    3072:FzKAB+q50OlgUs0Enn5SR6Aa5Gh9kBSVk:EAB+1CgUcn5S01Ah9n

Score
10/10

Malware Config

Extracted

Family

trickbot

Version

1000512

Botnet

xml1

C2

95.171.16.42:443

185.90.61.9:443

5.1.81.68:443

185.99.2.65:443

134.119.191.11:443

85.204.116.100:443

78.108.216.47:443

51.81.112.144:443

194.5.250.121:443

185.14.31.104:443

185.99.2.66:443

107.175.72.141:443

192.3.247.123:443

134.119.191.21:443

85.204.116.216:443

91.235.129.20:443

181.129.104.139:449

181.112.157.42:449

181.129.134.18:449

131.161.253.190:449

Attributes
  • autorun
    Name:pwgrab
ecc_pubkey.base64

Targets

    Tasks