General

  • Target

    c1a8d92dd4d6a2e51be9be6957c6d0398bef80a667c879c365c622033ea7a8a5

  • Size

    15.1MB

  • Sample

    201020-gxzf1mmvtx

  • MD5

    e7f0ad7c8740f34c7e8758234852693b

  • SHA1

    1d9335624cae52fa452cb5bf735a447606a617c0

  • SHA256

    c1a8d92dd4d6a2e51be9be6957c6d0398bef80a667c879c365c622033ea7a8a5

  • SHA512

    b7bdc5dd1feb6a33bbb64f5f5d514126e3d523e7b78927d32207028c64639b56817d7e6661557b2cb62d01bdd40ec18226f0d5f24f8d1b245448a6dba75b4dc9

Score
10/10

Malware Config

Targets

    • Target

      c1a8d92dd4d6a2e51be9be6957c6d0398bef80a667c879c365c622033ea7a8a5

    • Size

      15.1MB

    • MD5

      e7f0ad7c8740f34c7e8758234852693b

    • SHA1

      1d9335624cae52fa452cb5bf735a447606a617c0

    • SHA256

      c1a8d92dd4d6a2e51be9be6957c6d0398bef80a667c879c365c622033ea7a8a5

    • SHA512

      b7bdc5dd1feb6a33bbb64f5f5d514126e3d523e7b78927d32207028c64639b56817d7e6661557b2cb62d01bdd40ec18226f0d5f24f8d1b245448a6dba75b4dc9

    Score
    10/10
    • BazarBackdoor

      Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

    • Blacklisted process makes network request

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks