General

  • Target

    b682c3220977589e57e52db385c538f9_JaffaCakes118

  • Size

    332KB

  • Sample

    241202-dpkw4ssjen

  • MD5

    b682c3220977589e57e52db385c538f9

  • SHA1

    dc704cb2e1bbca69e3d068b3e630af3c2745dd70

  • SHA256

    ef5a54d5db53b4048dddc782c78f7afc2d66a2f24e480d91be9c9a96d085f117

  • SHA512

    5353079e086130e9408ecbf18b391fd709f903cba03fc0dbead335b2fdebad3e07093d852d6f4ba03d8f1147531c14ff2129b9cb81e15317fe3c2c0c222cc3aa

  • SSDEEP

    6144:5fjz/OEjZzrjhHqbabslnCfyytYQg9rLJmQkdFLT9yx/0+zN6:5ff/blHK4s0yuZgZJmQk7tyZ0+A

Malware Config

Extracted

Family

trickbot

Version

1000306

Botnet

tot359

C2

188.68.208.240:443

24.247.181.155:449

174.105.235.178:449

188.68.211.126:443

181.113.17.230:449

174.105.233.82:449

71.14.129.8:449

216.183.62.43:449

42.115.91.177:443

198.46.160.217:443

71.94.101.25:443

206.130.141.255:449

92.38.163.39:443

74.140.160.33:449

65.31.241.133:449

140.190.54.187:449

24.247.181.226:449

64.203.225.216:449

23.94.187.116:443

103.110.91.118:449

Attributes
  • autorun
    Control:GetSystemInfo
    Name:systeminfo
    Name:injectDll
    Name:pwgrab
ecc_pubkey.base64

Targets

    • Target

      b682c3220977589e57e52db385c538f9_JaffaCakes118

    • Size

      332KB

    • MD5

      b682c3220977589e57e52db385c538f9

    • SHA1

      dc704cb2e1bbca69e3d068b3e630af3c2745dd70

    • SHA256

      ef5a54d5db53b4048dddc782c78f7afc2d66a2f24e480d91be9c9a96d085f117

    • SHA512

      5353079e086130e9408ecbf18b391fd709f903cba03fc0dbead335b2fdebad3e07093d852d6f4ba03d8f1147531c14ff2129b9cb81e15317fe3c2c0c222cc3aa

    • SSDEEP

      6144:5fjz/OEjZzrjhHqbabslnCfyytYQg9rLJmQkdFLT9yx/0+zN6:5ff/blHK4s0yuZgZJmQk7tyZ0+A

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot family

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks