The #ContiLeaks contained some messages consisting of IP:Username:pass combinations for #Conti infrastructure.
This allows us to connect certain #Trickbot activcity with the #Conti group:
1/x
The IP's in the image are the following:
117.252.69[.]134
117.252.68[.]15
116.206.153[.]212
103.78.13[.]150
103.47.170[.]131
103.47.170[.]130
118.91.190[.]42
117.197.41[.]36
117.222.63[.]77
117.252.69[.]210
2/x
Using @MaltegoHQ together with OTX/Alienvault and @virustotal integration, we are able to connect several of these IP's to #Trickbot activity:
3/x
Some interesting observations:
- OTX shows that many of these devices used for spreading Trickbot are running #RouterOS by #Mikrotik
- 5 IPs don't have #malware attribution. These are all based in India. Maybe attack infrastructure ?
4/x
Some other malware can be observed associated: #Qbot / #Dridex
34fced20fd7d43fb4c8216e0bae2b55b4419f6d68fe4f5248eb4fa196d1d9e50
Ok, as this Tweet got waaaay more tracktion then I anticipated, I am following it up with an OTX Event to share all connected IoC!
Thanks for everyone viewing, liking and sharing my work ! <3 otx.alienvault.com/pulse/6223cad8…
• • •
Missing some Tweet in this thread? You can try to
force a refresh