2018-10-04 - QUICK POST: TRICKBOT SPREADS FROM CLIENT TO DC
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- 2018-10-04-Trickbot-malspam-1140-UTC.eml.zip 42.8 kB (42,786 bytes)
- 2018-10-04-Trickbot-spreads-from-client-to-DC.pcap.zip 31.6 MB (31,621,376 bytes)
- 2018-10-04-Trickbot-malware-and-artifacts.zip 24.2 MB (24,221,665 bytes)
- Incoming_CHAPS_Form.doc
- Client/
- Client/2018-10-04-downloaded-trickbot-binary-gtag-ser1004.exe
- Client/2018-10-04-Trickbot-artifact-symbolqtring.bat.txt
- Client/2018-10-04-Trickbot-scheduled-task-on-client-Msnetcs.xml.txt
- Client/AMNI/
- Client/AMNI/FAQ
- Client/AMNI/grabber_temp.INTEG.RAW
- Client/AMNI/Modules/
- Client/AMNI/Modules/importDll64
- Client/AMNI/Modules/injectDll64
- Client/AMNI/Modules/injectDll64_configs/
- Client/AMNI/Modules/injectDll64_configs/dinj
- Client/AMNI/Modules/injectDll64_configs/dpost
- Client/AMNI/Modules/injectDll64_configs/sinj
- Client/AMNI/Modules/mailsearcher64
- Client/AMNI/Modules/mailsearcher64_configs/
- Client/AMNI/Modules/mailsearcher64_configs/mailconf
- Client/AMNI/Modules/networkDll64
- Client/AMNI/Modules/networkDll64_configs/
- Client/AMNI/Modules/networkDll64_configs/dpost
- Client/AMNI/Modules/shareDll64
- Client/AMNI/Modules/systeminfo64
- Client/AMNI/Modules/wormDll64
- Client/AMNI/README.md
- Client/AMNI/rrrrrrrrrrr.exe
- Client/AMNI/tetup.exe
- DC/
- DC/2018-10-04-Trickbot-binary-C-Windows-System32-setup.exe
- DC/2018-10-04-Trickbot-scheduled-task-on-DC-Msnetcs.xml.txt
- DC/AMNI/
- DC/AMNI/FAQ
- DC/AMNI/Modules/
- DC/AMNI/Modules/importDll64
- DC/AMNI/Modules/injectDll64
- DC/AMNI/Modules/injectDll64_configs/
- DC/AMNI/Modules/injectDll64_configs/dinj
- DC/AMNI/Modules/injectDll64_configs/dpost
- DC/AMNI/Modules/injectDll64_configs/sinj
- DC/AMNI/Modules/mailsearcher64
- DC/AMNI/Modules/mailsearcher64_configs/
- DC/AMNI/Modules/mailsearcher64_configs/mailconf
- DC/AMNI/Modules/networkDll64
- DC/AMNI/Modules/networkDll64_configs/
- DC/AMNI/Modules/networkDll64_configs/dpost
- DC/AMNI/Modules/shareDll64
- DC/AMNI/Modules/systeminfo64
- DC/AMNI/README.md
- DC/AMNI/tetup.exe
NOTES:
- I usually see Trickbot send a Trickbot malware binary through SMB when spreading from client to DC.
- With the above method, you can export the two associated malware binaries from SMB in Wireshark as seen in this example posted on 2018-08-07.
- But today Trickbot used a "URL through SMB" propagation method to spread from client to DC, which I've only seen one time prior to this on 2018-08-17 (link).
- With the second method, there are no malware binaries in the SMB traffic.
IMAGES
Shown above: Traffic from the infection filtered in Wireshark.
Shown above: URL for the Trickbot binary to infect the DC sent over SMB from the client to the DC.
Click here to return to the main page.