2018-08-07 - QUICK POST: TRICKBOT (GTAG: TOT284) MOVES FROM CLIENT TO DC
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
ASSOCIATED FILES:
- Zip archive of the infection traffic: 2018-08-07-Trickbot-moves-from-client-to-DC.pcap.zip 11.7 MB (11,747,471 bytes)
 - Zip archive of the malware & artifacts: 2018-08-07-Trickbot-malware.zip 607 kB (606,950 bytes)
 
NOTES:
- Found today's Trickbot gtag tot284 sample on VirusTotal, but I don't know where it originally came from.
 - Today's example spread from an infected Windows client on 172.16.10[.]191 to its domain controller at 172.16.10[.]2.
 
IMAGES

Shown above:  Traffic from the infection filtered in Wireshark.

Shown above:  Trickbot sent from Windows client to the DC over SMB on TCP port 445.

Shown above:  In Wireshark, you can export the Trickbot malware from the SMB traffic as shown above.

Shown above:  Trickbot on the DC shows as gtag lib284.
Click here to return to the main page.
