Analysis
-
max time kernel
134s -
max time network
146s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
08-11-2020 14:08
Static task
static1
Behavioral task
behavioral1
Sample
c486be4ea4d6785b739cffaa64573e897f26284e5b0971d5ce5ae2eae43a1930.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
c486be4ea4d6785b739cffaa64573e897f26284e5b0971d5ce5ae2eae43a1930.exe
Resource
win10v20201028
General
-
Target
c486be4ea4d6785b739cffaa64573e897f26284e5b0971d5ce5ae2eae43a1930.exe
-
Size
243KB
-
MD5
c64e86d432038f1045d0c8cdc85e05ae
-
SHA1
e8e51f8717c377ca1063b8c38b0c69281977c805
-
SHA256
c486be4ea4d6785b739cffaa64573e897f26284e5b0971d5ce5ae2eae43a1930
-
SHA512
4c3f7ad76c082aefe4450d4978b605b8c372475abfe2105a51d11b99f9e46bc5972b4e7c0cdc5323f57a0656c5ce58fe757eaf97d69032185a2032436e3c59fd
Malware Config
Signatures
-
BazarBackdoor 1 IoCs
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
Processes:
description flow ioc HTTP URL 8 https://45.148.120.173/852b57d84ba48302555ce2a35a1277ce/4
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1364-0-0x000007FEF7FE0000-0x000007FEF825A000-memory.dmpFilesize
2.5MB