2018-12-07 - NEW TRICKBOT MODULES BCCLIENTDLLTESTTEST64 AND NEWBCTESTNDLL64
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- 2018-12-07-Trickbot-infection-traffic-ser1207.pcap.zip 45.5 MB (45,470,323 bytes)
- 2018-12-07-malware-artifacts-and-modules-from-Trickbot-infected-client-and-DC.zip 31.6 MB (31,562,151 bytes)
NOTES:
- I generated today's Trickbot traffic (gtag: ser1207) based on info from a blog posted earlier today (link).
- In today's infection I saw two Trickbot modules I hadn't noticed before: bcClientDllTestTest64 and NewBCtestnDll64 (note the lower-case "n" in "NewBCtestnDll64")
- I also saw traffic I hadn't seen associated with Trickbot before, possibly related to socks5systemz according to the EmergingThreats alerts I got.
- Last year, @HerbieZimmerman saw the same type of actity that included traffic to changetheworld[.]bit on 2017-08-30 (link).
- I've included the Trickbot modules/config files from the infected DC and client, if anyone wants to try and decode them--the new modules were only on the DC.
IMAGES:
Shown above: Traffic from the infection filtered in Wireshark.
Shown above: Traffic possibly related to socks5systemz.
Shown above: More traffic possibly related socks5systemz, where it looks like my DC is being used as a proxy to browse something.
Shown above: Some alerts from the EmergingThreats Pro ruleset on Security Onion using Suricata.
Shown above: New modules seen on the infected DC (new to me, at least).
Click here to return to the main page.