General

  • Target

    81fa8a3bdc452dd2b279b61fed92fe83d65e650e06bca9ee4dfcf991a4a59e77.zip

  • Size

    284KB

  • Sample

    231022-vkye3sbc6y

  • MD5

    c8f6180a6744608d7fcf2cc9d9e1d3e3

  • SHA1

    9bfb079fd2391d3eda7b074c5ea4b0e0f69672c4

  • SHA256

    0a92709168331ae286185eb12f16cba9e6902bde7f2a4e400f192e2adedb12fb

  • SHA512

    719393deb885a3470b3889364d1dc2ea7581858ca7a7f440f403e9ed69fe1941a2dbf66dd0cca74e50ad798c0aa047801dae193b8dd772340213978dd75aa7cc

  • SSDEEP

    6144:JkRMP1F0ZZZdgOTlUMiG9gKUBmP/6HTwzR0wN/4x6se8K:JyMtyHJhUDig/BmPCFwNgx5ef

Malware Config

Extracted

Family

trickbot

Version

1000512

Botnet

yas45

C2

95.171.16.42:443

185.90.61.9:443

5.1.81.68:443

185.99.2.65:443

134.119.191.11:443

85.204.116.100:443

78.108.216.47:443

51.81.112.144:443

194.5.250.121:443

185.14.31.104:443

185.99.2.66:443

107.175.72.141:443

192.3.247.123:443

134.119.191.21:443

85.204.116.216:443

91.235.129.20:443

181.129.104.139:449

181.112.157.42:449

181.129.134.18:449

131.161.253.190:449

Attributes
  • autorun
    Name:pwgrab
ecc_pubkey.base64

Targets

    • Target

      81fa8a3bdc452dd2b279b61fed92fe83d65e650e06bca9ee4dfcf991a4a59e77.exe

    • Size

      432KB

    • MD5

      7773c8164949a42936c4d1374cf16284

    • SHA1

      9e92535dc7bcdd7bf677a643f90ee730784edfc6

    • SHA256

      81fa8a3bdc452dd2b279b61fed92fe83d65e650e06bca9ee4dfcf991a4a59e77

    • SHA512

      8569116004d7b7154fced5a1a6f9d6ed111cae4cf71a68942fc0b978f5fb42db5b595c059fa77bd787cb923c99894dfc07accbc201c38caa02e3f2a235a9d61c

    • SSDEEP

      6144:K7SsTkhdodKqFnpNB0ZBPpYbDhk2N+mBN0fmWbli/eQ8CAFCKz62bxMP7RTitG:WmhdSHZoY/y2MM0fm6lfQIR62lM9iA

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

MITRE ATT&CK Matrix

Tasks