General

  • Target

    8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4

  • Size

    365KB

  • Sample

    200910-qkcd2agbt2

  • MD5

    5f64cc672ea13388797599b40a62d9be

  • SHA1

    82523c8c89c052c7bda11b1ad0bf27affd26e906

  • SHA256

    8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4

  • SHA512

    3c22f98b26826024e378e0e8cf148641d0b1b1d119a97f574ce6fbcd83e4b54b685bb72be1193c1a7b860b34480e88ed1a4ff64af9cc1bafad58e1d6d4ff5cfb

Malware Config

Targets

    • Target

      8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4

    • Size

      365KB

    • MD5

      5f64cc672ea13388797599b40a62d9be

    • SHA1

      82523c8c89c052c7bda11b1ad0bf27affd26e906

    • SHA256

      8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4

    • SHA512

      3c22f98b26826024e378e0e8cf148641d0b1b1d119a97f574ce6fbcd83e4b54b685bb72be1193c1a7b860b34480e88ed1a4ff64af9cc1bafad58e1d6d4ff5cfb

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • BazarBackdoor

      Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

    • Bazar/Team9 Backdoor payload

    • Tries to connect to .bazar domain

      Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks