2019-11-13 - DATA DUMP: ICEDID INFECTION WITH ANUBIS VNC AND TRICKBOT IN AD ENVIRONMENT
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
NOTES:
- In this infection, Trickbot spread from the client to its domain controller.
 - I missed the Anubis VNC traffic on 94.103.9[.]196 over TCP port 8080 in this pcap when I originally made this post.
 - For more information on Anubis VNC, see: https://blog.nviso.eu/2023/03/20/icedids-vnc-backdoors-dark-cat-anubis-keyhole/
 
ASSOCIATED FILES:
- 2019-11-13-IcedID-infection-with-Anubis-VNC-and-Trickbot-in-AD-environment.pcap.zip 78.2 MB (78,219,073 bytes)
 - 2019-11-13-malware-and-artifacts-from-IcedID-infection-with-Anubis-VNC-and-Trickbot-in-AD-environment.zip 32.2 MB (32,245,022 bytes)
 
IMAGES

Shown above:  Screenshot of video from the decoded VNC traffic.
Click here to return to the main page.
