2018-10-18 - TRICKBOT MALSPAM USING LINKS, NOT ATTACHMENTS (GTAG: ANY1)

ASSOCIATED FILES:

 

NOTES:

 


Shown above:  Flowchart for today's Trickbot activity.

 

DOMAINS AND URLS

SITES PUSHING THE WORD DOCUMENTS:

EXAMPLES OF URLS THAT RETURNED WORD DOCUMENTS:

URLS FOR TRICKBOT BINARIES:

URLS FOR AZORULT:

 

MALWARE

DOWNLOADED WORD DOC WITH MACRO FOR TRICKBOT:

TRICKBOT MALWARE BINARY (GTAG: ANY1):

AZORULT:

 

IMAGES


Shown above:  Downloading a Word documents from one of the malspam links.

 


Shown above:  Traffic from an infection filtered in Wireshark.

 


Shown above:  Extracting Trickbot binaries from the SMB traffic.

 


Shown above:  Saw a pwgrab64 module I don't remember seeing before.

 

FINAL NOTES

Once again, here are the associated files:

Zip archives are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.