Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
08-11-2020 14:19
Static task
static1
Behavioral task
behavioral1
Sample
0a2f4106b2b4d9b85726e7da86b371c863e405375b8284fffac9e8fbb56badd4.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
0a2f4106b2b4d9b85726e7da86b371c863e405375b8284fffac9e8fbb56badd4.exe
Resource
win10v20201028
General
-
Target
0a2f4106b2b4d9b85726e7da86b371c863e405375b8284fffac9e8fbb56badd4.exe
-
Size
330KB
-
MD5
4d952a8276267df5f11a181c149dcfce
-
SHA1
fc76cef4c7414998e7cb35eb95b287ccc4abf8c2
-
SHA256
0a2f4106b2b4d9b85726e7da86b371c863e405375b8284fffac9e8fbb56badd4
-
SHA512
d5142bb7a000e3311034e69afc1aadccc658b5271c7977e97f4dd059207825ad9f0532a67de99a6394f318d6aa8e1439826115a91169fd450914919c8eb9e69d
Malware Config
Signatures
-
BazarBackdoor 1 IoCs
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
Processes:
description flow ioc HTTP URL 8 https://194.87.145.86/852b57d84ba48302555ce2a35a1277ce/4
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1408-0-0x000007FEF7F80000-0x000007FEF81FA000-memory.dmpFilesize
2.5MB