<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>truebot &#8211; ViriBack Blog</title>
	<atom:link href="https://viriback.com/tag/truebot/feed/" rel="self" type="application/rss+xml" />
	<link>https://viriback.com</link>
	<description>Malware Tracker, IOCs &#38; more ...</description>
	<lastBuildDate>Sun, 09 Apr 2023 12:25:05 +0000</lastBuildDate>
	<language>en-CA</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://viriback.com/wp-content/uploads/2019/01/cropped-android-chrome-512x512-32x32.png</url>
	<title>truebot &#8211; ViriBack Blog</title>
	<link>https://viriback.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>ModernLoader to Truebot via PNG</title>
		<link>https://viriback.com/modernloader-to-truebot-via-png/</link>
		
		<dc:creator><![CDATA[Viriback]]></dc:creator>
		<pubDate>Sat, 08 Apr 2023 00:57:48 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[modernloader]]></category>
		<category><![CDATA[truebot]]></category>
		<guid isPermaLink="false">https://viriback.com/?p=282</guid>

					<description><![CDATA[While perusing on VT I found a new C2 domain for TrueBot. I have compiled a list of IOC's denoting the infection chain and some notes related to it. It starts with some JavaScript files. 4 of them have been identified and pointing to same TrueBot C2 ultimately. At time of writing this, they all  [...]]]></description>
										<content:encoded><![CDATA[<p>While perusing on VT I found a new C2 domain for TrueBot.</p>
<p>I have compiled a list of IOC&#8217;s denoting the infection chain and some notes related to it.</p>
<p>It starts with some JavaScript files. 4 of them have been identified and pointing to same TrueBot C2 ultimately.</p>
<p><img decoding="async" class="size-full wp-image-283 alignleft" src="https://viriback.com/wp-content/uploads/2023/04/0-vt.png" alt="" width="187" height="191" srcset="https://viriback.com/wp-content/uploads/2023/04/0-vt-66x66.png 66w, https://viriback.com/wp-content/uploads/2023/04/0-vt.png 187w" sizes="(max-width: 187px) 100vw, 187px" />At time of writing this, they all had low detection on VT, with 2 out of 59 engines falling them as malicious.</p>
<p>MD5<br />
71e7a2549311647a6178b84393700bf8<br />
4c75c5f63418b48ede30c16b079f324a<br />
3c57867dc4bdeb8a7d55dfb7d8ef5008<br />
287b172c23da5426cf039ef55d959fbd</p>
<p>&nbsp;</p>
<p>As per comment from @thor_scanner on VT. These files are from an unknown Javascript obfuscator and first noticed in February 23 by the @malwrhunterteam on Twitter.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-284" src="https://viriback.com/wp-content/uploads/2023/04/2-thor.png" alt="" width="674" height="249" srcset="https://viriback.com/wp-content/uploads/2023/04/2-thor-200x74.png 200w, https://viriback.com/wp-content/uploads/2023/04/2-thor-300x111.png 300w, https://viriback.com/wp-content/uploads/2023/04/2-thor-400x148.png 400w, https://viriback.com/wp-content/uploads/2023/04/2-thor-600x222.png 600w, https://viriback.com/wp-content/uploads/2023/04/2-thor.png 674w" sizes="(max-width: 674px) 100vw, 674px" /></p>
<p>See the comment <a href="https://www.virustotal.com/gui/file/f523d4bfcd07dd6d32441fcdb9342b35fb018606a9b0f1304f451dc67a7a3ccf/community">here</a></p>
<p><img decoding="async" class="aligncenter size-full wp-image-285" src="https://viriback.com/wp-content/uploads/2023/04/1-feb23.png" alt="" width="616" height="387" srcset="https://viriback.com/wp-content/uploads/2023/04/1-feb23-200x126.png 200w, https://viriback.com/wp-content/uploads/2023/04/1-feb23-300x188.png 300w, https://viriback.com/wp-content/uploads/2023/04/1-feb23-320x202.png 320w, https://viriback.com/wp-content/uploads/2023/04/1-feb23-400x251.png 400w, https://viriback.com/wp-content/uploads/2023/04/1-feb23-600x377.png 600w, https://viriback.com/wp-content/uploads/2023/04/1-feb23.png 616w" sizes="(max-width: 616px) 100vw, 616px" /></p>
<p>&nbsp;</p>
<p>See: <a href="https://twitter.com/malwrhunterteam/status/1627751337252249600">Tweet Here</a></p>
<p>These files are heavily obfuscated Javascript file, that I didnt waste time on trying to deobfuscate. I trusted the sandbox execution on VT to further correlate.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-287" src="https://viriback.com/wp-content/uploads/2023/04/4-js-1.png" alt="" width="636" height="479" srcset="https://viriback.com/wp-content/uploads/2023/04/4-js-1-200x151.png 200w, https://viriback.com/wp-content/uploads/2023/04/4-js-1-300x226.png 300w, https://viriback.com/wp-content/uploads/2023/04/4-js-1-400x301.png 400w, https://viriback.com/wp-content/uploads/2023/04/4-js-1-600x452.png 600w, https://viriback.com/wp-content/uploads/2023/04/4-js-1.png 636w" sizes="(max-width: 636px) 100vw, 636px" /></p>
<p>They all called out to a url on the following IP: 62[.]204[.]41[.]69. The Url in question is : hxxp://62[.]204[.]41[.]69/dll[.]png</p>
<p><img decoding="async" class="aligncenter size-full wp-image-289" src="https://viriback.com/wp-content/uploads/2023/04/3-wire-1.png" alt="" width="625" height="319" srcset="https://viriback.com/wp-content/uploads/2023/04/3-wire-1-200x102.png 200w, https://viriback.com/wp-content/uploads/2023/04/3-wire-1-300x153.png 300w, https://viriback.com/wp-content/uploads/2023/04/3-wire-1-400x204.png 400w, https://viriback.com/wp-content/uploads/2023/04/3-wire-1-600x306.png 600w, https://viriback.com/wp-content/uploads/2023/04/3-wire-1.png 625w" sizes="(max-width: 625px) 100vw, 625px" /></p>
<p>&nbsp;</p>
<p><img decoding="async" class="aligncenter size-large wp-image-290" src="https://viriback.com/wp-content/uploads/2023/04/31-wire-1024x512.png" alt="" width="1024" height="512" srcset="https://viriback.com/wp-content/uploads/2023/04/31-wire-200x100.png 200w, https://viriback.com/wp-content/uploads/2023/04/31-wire-300x150.png 300w, https://viriback.com/wp-content/uploads/2023/04/31-wire-400x200.png 400w, https://viriback.com/wp-content/uploads/2023/04/31-wire-600x300.png 600w, https://viriback.com/wp-content/uploads/2023/04/31-wire-768x384.png 768w, https://viriback.com/wp-content/uploads/2023/04/31-wire-800x400.png 800w, https://viriback.com/wp-content/uploads/2023/04/31-wire-1024x512.png 1024w, https://viriback.com/wp-content/uploads/2023/04/31-wire.png 1031w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>&nbsp;</p>
<p>WGET on this url retrieves a file, that was not recognized as an image of PNG format. The MD5 of the file was: 8245ac0319d4b55dd29a13e20fc5db35</p>
<p>This script as show above in the HTTP response of the screenshot, gave us another interesting url : hxxp://62[.]204[.]41[.]69/ldn[.]dll</p>
<p>Which served a another payload in the form of a dll with MD5 hash: f52363b6cf282669e5fcc5537b5c3451</p>
<p>This one is Truebot. It is a signed code file and loaded the previously mentionned script.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-302" src="https://viriback.com/wp-content/uploads/2023/04/6-signed.png" alt="" width="336" height="460" srcset="https://viriback.com/wp-content/uploads/2023/04/6-signed-200x274.png 200w, https://viriback.com/wp-content/uploads/2023/04/6-signed-219x300.png 219w, https://viriback.com/wp-content/uploads/2023/04/6-signed.png 336w" sizes="(max-width: 336px) 100vw, 336px" /></p>
<p>&nbsp;</p>
<p>That Truebot sample calls out to domain: droogggdhfhf[.]com which is hosted on the following IP: 92[.]118[.]36[.]236 but the server doesnt seem to respond at the moment.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-292" src="https://viriback.com/wp-content/uploads/2023/04/7-resolve-1.png" alt="Truebot Resolves" width="719" height="466" srcset="https://viriback.com/wp-content/uploads/2023/04/7-resolve-1-200x130.png 200w, https://viriback.com/wp-content/uploads/2023/04/7-resolve-1-300x194.png 300w, https://viriback.com/wp-content/uploads/2023/04/7-resolve-1-400x259.png 400w, https://viriback.com/wp-content/uploads/2023/04/7-resolve-1-600x389.png 600w, https://viriback.com/wp-content/uploads/2023/04/7-resolve-1.png 719w" sizes="(max-width: 719px) 100vw, 719px" /></p>
<p>Further to this, the IP serving the payload: 62[.]204[.]41[.]69 is host to ModernLoader C2 Panel at hxxp://62[.]204[.]41[.]69/AVA/</p>
<p><img decoding="async" class="aligncenter size-full wp-image-295" src="https://viriback.com/wp-content/uploads/2023/04/avatar-2.png" alt="" width="808" height="436" srcset="https://viriback.com/wp-content/uploads/2023/04/avatar-2-200x108.png 200w, https://viriback.com/wp-content/uploads/2023/04/avatar-2-300x162.png 300w, https://viriback.com/wp-content/uploads/2023/04/avatar-2-400x216.png 400w, https://viriback.com/wp-content/uploads/2023/04/avatar-2-600x324.png 600w, https://viriback.com/wp-content/uploads/2023/04/avatar-2-768x414.png 768w, https://viriback.com/wp-content/uploads/2023/04/avatar-2-800x432.png 800w, https://viriback.com/wp-content/uploads/2023/04/avatar-2.png 808w" sizes="(max-width: 808px) 100vw, 808px" /></p>
<p>&nbsp;</p>
<p><strong>IOCs:</strong></p>
<p><strong>Javascript MD5 Hash:</strong></p>
<p>71e7a2549311647a6178b84393700bf8<br />
4c75c5f63418b48ede30c16b079f324a<br />
3c57867dc4bdeb8a7d55dfb7d8ef5008<br />
287b172c23da5426cf039ef55d959fbd</p>
<p><strong>Fake PNG MD5 Hash:</strong></p>
<p>8245ac0319d4b55dd29a13e20fc5db35</p>
<p><strong>Truebot DLL payload MD5 Hash:</strong></p>
<p>f52363b6cf282669e5fcc5537b5c3451</p>
<p><strong>ModernLoader IP:</strong></p>
<p>62[.]204[.]41[.]69.</p>
<p><strong>ModernLoader URL:</strong></p>
<p>hxxp://62[.]204[.]41[.]69/dll[.]png</p>
<p><strong>Truebot Callout C2 Domain:</strong></p>
<p>droogggdhfhf[.]com</p>
<p><strong>Truebot C2 IP:</strong></p>
<p>92[.]118[.]36[.]236</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
