General

  • Target

    566e13e8c5d8ed5c97d9162c4c6ba5d0_JaffaCakes118

  • Size

    332KB

  • Sample

    241018-kez2lsxblg

  • MD5

    566e13e8c5d8ed5c97d9162c4c6ba5d0

  • SHA1

    f09dbdba1c53a02c416620c9ca07f7e517076677

  • SHA256

    d3bb47fb961a415f8adc37b8154c42ee2214cd81c8fcb56982980eacd3b6ea86

  • SHA512

    13a75d9875ca31a67401470228f9aba44cbb5883d8692ca193b6b3eef8f6e7777f461df2ee53a4a8de986116bb857672684ed16e7d416efaae83fc1bf2a8d972

  • SSDEEP

    6144:50Xc85ziBHz6lDiBo8jcdMheQ/Qj4tcmMpcG3C6YFlfTNU:50XciziBT6u3YdM0Ae41MpcG3Q6

Malware Config

Extracted

Family

trickbot

Version

1000305

Botnet

lib359

C2

188.68.208.240:443

24.247.181.155:449

174.105.235.178:449

188.68.211.126:443

181.113.17.230:449

174.105.233.82:449

71.14.129.8:449

216.183.62.43:449

42.115.91.177:443

137.74.151.18:443

71.94.101.25:443

206.130.141.255:449

92.38.163.39:443

74.140.160.33:449

65.31.241.133:449

140.190.54.187:449

24.247.181.226:449

64.203.225.216:449

213.183.63.245:443

103.110.91.118:449

Attributes
  • autorun
    Control:GetSystemInfo
    Name:systeminfo
    Name:injectDll
    Name:pwgrab
ecc_pubkey.base64

Targets

    • Target

      566e13e8c5d8ed5c97d9162c4c6ba5d0_JaffaCakes118

    • Size

      332KB

    • MD5

      566e13e8c5d8ed5c97d9162c4c6ba5d0

    • SHA1

      f09dbdba1c53a02c416620c9ca07f7e517076677

    • SHA256

      d3bb47fb961a415f8adc37b8154c42ee2214cd81c8fcb56982980eacd3b6ea86

    • SHA512

      13a75d9875ca31a67401470228f9aba44cbb5883d8692ca193b6b3eef8f6e7777f461df2ee53a4a8de986116bb857672684ed16e7d416efaae83fc1bf2a8d972

    • SSDEEP

      6144:50Xc85ziBHz6lDiBo8jcdMheQ/Qj4tcmMpcG3C6YFlfTNU:50XciziBT6u3YdM0Ae41MpcG3Q6

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks