General

  • Target

    b682c3220977589e57e52db385c538f9_JaffaCakes118

  • Size

    332KB

  • Sample

    241202-dpkw4ssjen

  • MD5

    b682c3220977589e57e52db385c538f9

  • SHA1

    dc704cb2e1bbca69e3d068b3e630af3c2745dd70

  • SHA256

    ef5a54d5db53b4048dddc782c78f7afc2d66a2f24e480d91be9c9a96d085f117

  • SHA512

    5353079e086130e9408ecbf18b391fd709f903cba03fc0dbead335b2fdebad3e07093d852d6f4ba03d8f1147531c14ff2129b9cb81e15317fe3c2c0c222cc3aa

  • SSDEEP

    6144:5fjz/OEjZzrjhHqbabslnCfyytYQg9rLJmQkdFLT9yx/0+zN6:5ff/blHK4s0yuZgZJmQk7tyZ0+A

Malware Config

Extracted

Family

trickbot

Version

1000306

Botnet

tot359

C2

188.68.208.240:443

24.247.181.155:449

174.105.235.178:449

188.68.211.126:443

181.113.17.230:449

174.105.233.82:449

71.14.129.8:449

216.183.62.43:449

42.115.91.177:443

198.46.160.217:443

71.94.101.25:443

206.130.141.255:449

92.38.163.39:443

74.140.160.33:449

65.31.241.133:449

140.190.54.187:449

24.247.181.226:449

64.203.225.216:449

23.94.187.116:443

103.110.91.118:449

Attributes
  • autorun
    Control:GetSystemInfo
    Name:systeminfo
    Name:injectDll
    Name:pwgrab
ecc_pubkey.base64
1
RUNTMzAAAADzIIbbIE3wcze1+xiwwK+Au/P78UrAO8YAHyPvHEwGVKOPphl8QVfrC7x/QaFYeXANw6E4HF7ietEp+7ZVQdWOx8c+HvO0Z2PTUPVbX9HAVrg4h9u1RNfhOHk+YysDLsg=

Targets

    • Target

      b682c3220977589e57e52db385c538f9_JaffaCakes118

    • Size

      332KB

    • MD5

      b682c3220977589e57e52db385c538f9

    • SHA1

      dc704cb2e1bbca69e3d068b3e630af3c2745dd70

    • SHA256

      ef5a54d5db53b4048dddc782c78f7afc2d66a2f24e480d91be9c9a96d085f117

    • SHA512

      5353079e086130e9408ecbf18b391fd709f903cba03fc0dbead335b2fdebad3e07093d852d6f4ba03d8f1147531c14ff2129b9cb81e15317fe3c2c0c222cc3aa

    • SSDEEP

      6144:5fjz/OEjZzrjhHqbabslnCfyytYQg9rLJmQkdFLT9yx/0+zN6:5ff/blHK4s0yuZgZJmQk7tyZ0+A

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot family

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.