Goal: Reverse and document the latest module “network64/32Dll,” leveraged by the notorious Trickbot banking malware gang.
Decoded module hash “network64Dll”: aeb08b0651bc8a13dcf5e5f6c0d482f8
Decoded config in “network64Dll_configs:
Background:
A few extractions from today’s trickbot 02/04/2018:gtag-tt0002https://t.co/PUQaOWa0CI – Confighttps://t.co/30Rep77aY3 – Dposthttps://t.co/T77F5kQyaf – Mailconf@executemalware @Ring0x0 @James_inthe_box @JAMESWT_MHT @VK_Intel @clucianomartins @MakFLwana @CryptoInsane pic.twitter.com/Ugr8B8bbgW— V0id_Hunt3r (@v0id_hunter) April 2, 2018
https://platform.twitter.com/widgets.js Assessment
While reviewing Twitter posts related to Trickbot malware, I was alerted by a few researchers @Ring0x0 and @v0id_hunter to the new module dropped by the Trickbot gang “network64/32Dll.” This specific module appears to be one single harvester of all possible network victim information from running commands such as “ipconfig /all” and “nltest /domain_trusts /all_trusts” to WMI Query Language (WQL) queries such as “SELECT * FROM Win32_OperatingSystem” to lightweight directory access protocol (LDAP) queries. Notably, the gang leverages “nltest” commands to establish trust relationship between between a compromised workstation and its possible domain before quering LDAP. This is not the first time this gang leverages LDAP; they also developer a DomainGrabber module specifically to harvest sensitive domain controller information, as detailed earlier.
This tiny 24 KB module DLL, compiled on Friday March 30, 08:52:12 2018 UTC, is originally called “dll[.]dll.” The module itself consists of only 32 functions.
Possible Attack Methodology
The module is likely used by the gang to expand their access to victim networks possibly identifying high-value corporate domains that they can exploit further either via their “tab” module implementing its ETERNALROMANCE exploit implementation, paired with Mimikatz and/or establish deeper network persistence before they deploy additional malware.
The decoded Trickbot “network64Dll” module contains the usual Trickbot export functions:
- Control
- FreeBuffer
- Release
- Start
A. ***PROCESS LIST***
- SELECT * FROM Win32_OperatingSystem
- ipconfig /all
- net config workstation
- net view /all
- net view /all /domain
- nltest /domain_trusts
- nltest /domain_trusts /all_trusts
- User name
- Computer name
- Site name
- Domain shortname
- Domain name
- Forest name
- Domain controller
- Forest trees
- Name
- Full name
- Description
- Operating System
- IP-addres
- Comment
- Description
- Name
- Name
- Full name
- Description
- Operating System
- IP-addres
- Comment
- Description
- Name
p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 8.5px Helvetica}