2018-10-18 - TRICKBOT MALSPAM USING LINKS, NOT ATTACHMENTS (GTAG: ANY1)
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
ASSOCIATED FILES:
- Traffic: 2018-10-18-Trickbot-spreads-from-client-to-DC.pcap.zip 36 MB (36,003,371 bytes)
 - Malware and artifacts: 2018-10-18-Trickbot-malware-and-artifacts.zip 27 MB (27,022,801 bytes)
 
NOTES:
- I found a bunch of URLs returning a Word doc with macro for Trickbot on Wednesday 2018-10-17.
 - These are most likely coming from malspam, but I cannot find any of the emails.
 - Most of these sites hosting the Word docs are still active as of Thursday 2018-10-18.
 - Today's traffic is another example of Trickbot spreading from the infected client to an Active Directory (AD) domain controller.
 - Also saw AZORult during the Trickbot post-infection traffic.
 

Shown above:  Flowchart for today's Trickbot activity.
DOMAINS AND URLS
SITES PUSHING THE WORD DOCUMENTS:
- haisanthuytrieu[.]com
 - lachinsabegh[.]com
 - nongsan24h[.]com
 - official-agent[.]website
 - printnow[.]club
 
EXAMPLES OF URLS THAT RETURNED WORD DOCUMENTS:
- hxxp[:]//haisanthuytrieu[.]com/123/ORDER_04300.doc
 - hxxp[:]//haisanthuytrieu[.]com/123/ORDER_267422.doc
 - hxxp[:]//haisanthuytrieu[.]com/123/ORDER_684646.doc
 - hxxp[:]//lachinsabegh[.]com/123/REQ_52997.doc
 - hxxp[:]//lachinsabegh[.]com/123/REQ_179259.doc
 - hxxp[:]//nongsan24h[.]com/1/REQ_4828.doc
 - hxxp[:]//official-agent[.]website/123/ORDER_51048.doc
 - hxxp[:]//printnow[.]club/123/REQ_4789.doc
 - hxxp[:]//printnow[.]club/123/REQ_5911.doc
 - hxxp[:]//printnow[.]club/123/REQ_7945.doc
 - hxxp[:]//printnow[.]club/123/REQ_50907.doc
 - hxxp[:]//printnow[.]club/123/REQ_93584.doc
 - hxxp[:]//printnow[.]club/123/REQ_96240.doc
 - hxxp[:]//printnow[.]club/123/REQ_156177.doc
 - hxxp[:]//printnow[.]club/123/REQ_385315.doc
 - hxxp[:]//printnow[.]club/123/REQ_405698.doc
 - hxxp[:]//printnow[.]club/123/REQ_605500.doc
 - hxxp[:]//printnow[.]club/123/REQ_644654.doc
 - hxxp[:]//printnow[.]club/123/REQ_672029.doc
 - hxxp[:]//printnow[.]club/123/REQ_878346.doc
 - hxxp[:]//printnow[.]club/123/REQ_969031.doc
 
URLS FOR TRICKBOT BINARIES:
- hxxp[:]//46.173.219[.]15/pro.any
 - hxxp[:]//46.173.219[.]17/pro.any
 - hxxp[:]//185.251.39[.]251/radiance.png
 - hxxp[:]//185.251.39[.]251/table.png
 - hxxp[:]//185.251.39[.]251/worming.npg
 
URLS FOR AZORULT:
- hxxp[:]//printnow[.]club/au3.exe
 
MALWARE
DOWNLOADED WORD DOC WITH MACRO FOR TRICKBOT:
- SHA256 hash:  ade60e104de69920d17776b0ebcdf5b48244c49f27ed91fae9741f7f958a2eb9
File size: 89,088 bytes 
TRICKBOT MALWARE BINARY (GTAG: ANY1):
- SHA256 hash:  67fccd872795a7e1bef8b0077bc09dd67d4c3a3f5b1720ac0df77b3fb94aa96e
File size: 549,823 bytes 
AZORULT:
- SHA256 hash:  1744879954a7c0f6d7a7a9f82834564870865ad28e3ca25116a7c55de163a01f
File size: 567,808 bytes 
IMAGES

Shown above:  Downloading a Word documents from one of the malspam links.

Shown above:  Traffic from an infection filtered in Wireshark.

Shown above:  Extracting Trickbot binaries from the SMB traffic.

Shown above:  Saw a pwgrab64 module I don't remember seeing before.
Click here to return to the main page.
