General

  • Target

    0a2f4106b2b4d9b85726e7da86b371c863e405375b8284fffac9e8fbb56badd4

  • Size

    330KB

  • Sample

    201108-6q53hd5h7j

  • MD5

    4d952a8276267df5f11a181c149dcfce

  • SHA1

    fc76cef4c7414998e7cb35eb95b287ccc4abf8c2

  • SHA256

    0a2f4106b2b4d9b85726e7da86b371c863e405375b8284fffac9e8fbb56badd4

  • SHA512

    d5142bb7a000e3311034e69afc1aadccc658b5271c7977e97f4dd059207825ad9f0532a67de99a6394f318d6aa8e1439826115a91169fd450914919c8eb9e69d

Score
10/10

Malware Config

Targets

    • Target

      0a2f4106b2b4d9b85726e7da86b371c863e405375b8284fffac9e8fbb56badd4

    • Size

      330KB

    • MD5

      4d952a8276267df5f11a181c149dcfce

    • SHA1

      fc76cef4c7414998e7cb35eb95b287ccc4abf8c2

    • SHA256

      0a2f4106b2b4d9b85726e7da86b371c863e405375b8284fffac9e8fbb56badd4

    • SHA512

      d5142bb7a000e3311034e69afc1aadccc658b5271c7977e97f4dd059207825ad9f0532a67de99a6394f318d6aa8e1439826115a91169fd450914919c8eb9e69d

    Score
    10/10
    • BazarBackdoor

      Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks