Analysis
-
max time kernel
145s -
max time network
116s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
16-07-2020 16:26
Static task
static1
Behavioral task
behavioral1
Sample
55d95d9486d77df6ac79bb25eb8b8778940bac27021249f779198e05a2e1edae.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
55d95d9486d77df6ac79bb25eb8b8778940bac27021249f779198e05a2e1edae.exe
Resource
win10
General
-
Target
55d95d9486d77df6ac79bb25eb8b8778940bac27021249f779198e05a2e1edae.exe
-
Size
813KB
-
MD5
dfcf5342f034605cda27d08ce3706d0f
-
SHA1
d7b744fd876bc7434cab8f72df66d1bc9c7fcd1a
-
SHA256
55d95d9486d77df6ac79bb25eb8b8778940bac27021249f779198e05a2e1edae
-
SHA512
df597e3e87138fb585d9ae370a590b96c45bb581899879d5a583efc069656fce3aec2d2687dbd58eb08849de7defc9de0aa7029d78c84aa963b52587187c6008
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1500 55d95d9486d77df6ac79bb25eb8b8778940bac27021249f779198e05a2e1edae.exe 1500 55d95d9486d77df6ac79bb25eb8b8778940bac27021249f779198e05a2e1edae.exe -
BazarBackdoor
Stealthy backdoor targetting corporate networks, believed to be developed by Trickbot's authors.