2018-08-17 - EMOTET INFECTION WITH TRICKBOT --> TRICKBOT SPREADS TO DC

NOTICE:

ASSOCIATED FILES:

NOTES:

 

WEB TRAFFIC BLOCK LIST

Indicators are not a block list.  If you feel the need to block web traffic, I suggest the following URLs and partial URLs:

 

TRAFFIC


Shown above:  Traffic from the infection filtered in Wireshark.

 

INITIAL EMOTET INFECTION TRAFFIC:

 

TRICKBOT INFECTION TRAFFIC CAUSED BY THE EMOTET INFECTION:

 

FILE HASHES

MALWARE FROM THE INFECTED WINDOWS HOSTS:

 

IMAGES


Shown above:  No Trickbot EXE in the SMB traffic from client to DC like I've documented before.

 


Shown above:  No SMB traffic from the client to DC's C$ drive like I've documented before.

 


Shown above:  Before the DC retrieves Trickbot from 213.183.63.124/worming.png, we see the URL in traffic over TCP port 445 from the infected client to the DC.

 


Shown above:  That TCP port 445 caused the DC to retrieve the Trickbot binary from 213.183.63.124/worming.png and infect itself with it.

 

As I mentioned earlier, check here for an example of the way Trickbot moved to the DC previously.

 

Click here to return to the main page.