General

  • Target

    8930d6da65c119bd533ad19543bfe8c7_JaffaCakes118

  • Size

    548KB

  • Sample

    240601-dhqtsafe9t

  • MD5

    8930d6da65c119bd533ad19543bfe8c7

  • SHA1

    7199a6032ab3090509af9a2f16975e403afcd0a2

  • SHA256

    b363a02b73bf9363c468904aa13653b877112aa44b0c6e5c101b238e39ff3cce

  • SHA512

    ad0d1e7d4a1e89571d72bb21a9e9f30c024471f63b612617166589538cd76bd09dbb426f93ed424ba1b4ca7857bb1a49eaf97c320ce1f5778eefe97573f4988e

  • SSDEEP

    6144:b5rNoYGGPuNgvYstWJO+/ZksEm19SR3gmj5QaNKHaTJX22AAevH9h:PPlvYskOeEm/S1jj2SJX/eP9h

Malware Config

Extracted

Family

trickbot

Version

1000315

Botnet

tot371

C2

104.168.58.38:443

24.247.181.155:449

24.247.182.39:449

107.174.34.202:443

24.247.182.29:449

24.247.182.179:449

198.46.131.164:443

74.132.135.120:449

198.46.160.217:443

71.94.101.25:443

24.247.182.225:449

192.3.52.107:443

74.140.160.33:449

65.31.241.133:449

140.190.54.187:449

24.247.181.226:449

108.160.196.130:449

89.46.222.239:443

24.247.182.174:449

108.174.60.161:443

Attributes
  • autorun
    Control:GetSystemInfo
    Name:systeminfo
    Name:injectDll
    Name:pwgrab
ecc_pubkey.base64

Targets

    • Target

      8930d6da65c119bd533ad19543bfe8c7_JaffaCakes118

    • Size

      548KB

    • MD5

      8930d6da65c119bd533ad19543bfe8c7

    • SHA1

      7199a6032ab3090509af9a2f16975e403afcd0a2

    • SHA256

      b363a02b73bf9363c468904aa13653b877112aa44b0c6e5c101b238e39ff3cce

    • SHA512

      ad0d1e7d4a1e89571d72bb21a9e9f30c024471f63b612617166589538cd76bd09dbb426f93ed424ba1b4ca7857bb1a49eaf97c320ce1f5778eefe97573f4988e

    • SSDEEP

      6144:b5rNoYGGPuNgvYstWJO+/ZksEm19SR3gmj5QaNKHaTJX22AAevH9h:PPlvYskOeEm/S1jj2SJX/eP9h

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot x86 loader

      Detected Trickbot's x86 loader that unpacks the x86 payload.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks