Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
08-11-2020 17:48
Static task
static1
Behavioral task
behavioral1
Sample
75f0a3177e927caa63f8743a2cf4f503d032f36db929459bc2ba3761c45c682a.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
75f0a3177e927caa63f8743a2cf4f503d032f36db929459bc2ba3761c45c682a.exe
Resource
win10v20201028
General
-
Target
75f0a3177e927caa63f8743a2cf4f503d032f36db929459bc2ba3761c45c682a.exe
-
Size
219KB
-
MD5
71e1be0bf221c6f6663eb65b99d463b6
-
SHA1
ac27e4a59fb6fcc1935e9d40055e183d1ef055b1
-
SHA256
75f0a3177e927caa63f8743a2cf4f503d032f36db929459bc2ba3761c45c682a
-
SHA512
ea156a63f2daf9ed78b5e4399b4a6c613ebedfd4c5e5bf956fa3ae7eb25b114c6d1d0354c3c4960aabbbdffbeeaddb2acd9f682310238bd10c65635f1fec3138
Malware Config
Signatures
-
BazarBackdoor 3 IoCs
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
Processes:
description flow ioc HTTP URL 3 https://194.87.145.86/4d4a42d18398a238879e773c9b644970/2 HTTP URL 4 https://194.87.145.86/4d4a42d18398a238879e773c9b644970/2 HTTP URL 5 https://194.87.145.86/4d4a42d18398a238879e773c9b644970/2