General

  • Target

    839f88518c2d5385b307830455f502b4_JaffaCakes118

  • Size

    528KB

  • Sample

    240530-kp829sdc37

  • MD5

    839f88518c2d5385b307830455f502b4

  • SHA1

    059c0d1fcaa0aac1081e5539705147c7d4d85912

  • SHA256

    0773b6d51c5690eead83282b39d15ae088aa490e00a8fc49f12d0ede4fb6b3ed

  • SHA512

    2f27ae8ad29736981dab107887a01b30bb5857f307a41aaf0379828b0412a50815f6f02182f83f41fe5b02ec8be72de49959dca3cb00fb052780078ce49b6805

  • SSDEEP

    12288:njEDPLuie23q7ZyKuMtf64eS4R19o6Og4iIMt05F1Z:wDPLuBV7oJMtJYR19oTrR59

Malware Config

Extracted

Family

trickbot

Version

1000308

Botnet

tot361

C2

91.200.100.238:443

24.247.181.155:449

174.105.235.178:449

188.68.211.126:443

74.132.133.246:449

174.105.233.82:449

71.14.129.8:449

198.46.131.164:443

74.132.135.120:449

198.46.160.217:443

71.94.101.25:443

206.130.141.255:449

192.3.52.107:443

74.140.160.33:449

65.31.241.133:449

140.190.54.187:449

24.247.181.226:449

108.160.196.130:449

23.94.187.116:443

103.110.91.118:449

Attributes
  • autorun
    Control:GetSystemInfo
    Name:systeminfo
    Name:injectDll
    Name:pwgrab
ecc_pubkey.base64

Targets

    • Target

      839f88518c2d5385b307830455f502b4_JaffaCakes118

    • Size

      528KB

    • MD5

      839f88518c2d5385b307830455f502b4

    • SHA1

      059c0d1fcaa0aac1081e5539705147c7d4d85912

    • SHA256

      0773b6d51c5690eead83282b39d15ae088aa490e00a8fc49f12d0ede4fb6b3ed

    • SHA512

      2f27ae8ad29736981dab107887a01b30bb5857f307a41aaf0379828b0412a50815f6f02182f83f41fe5b02ec8be72de49959dca3cb00fb052780078ce49b6805

    • SSDEEP

      12288:njEDPLuie23q7ZyKuMtf64eS4R19o6Og4iIMt05F1Z:wDPLuBV7oJMtJYR19oTrR59

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot x86 loader

      Detected Trickbot's x86 loader that unpacks the x86 payload.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks