2018-09-06 - DATA DUMP (EMOTET, HANCITOR, AND TRICKBOT)
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
EMOTET INFECTION:
- 2018-09-06-Emotet-malspam-2-examples.zip 46 kB (46,348 bytes)
- 2018-09-06-Emotet-infection-with-IcedID-and-AZORult.pcap.zip 4.8 MB (4,793,795 bytes)
- 2018-09-06-malware-from-Emotet-infection.zip 631 kB (631,225 bytes)
HANCITOR INFECTION:
- 2018-09-06-Hancitor-malspam-example-1624-UTC.eml.zip 1.2 kB (1,200 bytes)
- 2018-09-06-Hancitor-infection-traffic.pcap.zip 427 kB (426,963 bytes)
- 2018-09-06-malware-from-Hancitor-infection.zip 331 kB (330,702 bytes)
TRICKBOT INFECTION - SPREAD FROM CLIENT TO DC - GTAG SER0906US (CLIENT) AND GTAG LIB305 (DC):
- 2018-09-06-Trickbot-malspam-example-1531-UTC.eml.zip 37.8 kB (37,755 bytes)
- 2018-09-06-Trickbot-infection-that-spread-from-client-to-DC.pcap.zip 15.6 MB (15,622,689 bytes)
- 2018-09-06-malware-and-artifacts-from-Trickbot-infection.zip 14.4 MB (14,409,788 bytes)
IMAGES:
Shown above: Traffic from the Emotet infection filtered in Wireshark.
Shown above: Traffic from the Hancitor infection filtered in Wireshark.
Shown above: Traffic from the Trickbot infection filtered in Wireshark (spread from client to DC).
Shown above: Using Wireshark to export Trickbot malware found in the SMB traffic.
Click here to return to the main page.