Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 20:56
Static task
static1
Behavioral task
behavioral1
Sample
d2e5302008e1f153faccc136644f29525ba3075c98354ad0f3a8589bbd53cffe.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
d2e5302008e1f153faccc136644f29525ba3075c98354ad0f3a8589bbd53cffe.exe
Resource
win10v20201028
General
-
Target
d2e5302008e1f153faccc136644f29525ba3075c98354ad0f3a8589bbd53cffe.exe
-
Size
214KB
-
MD5
2c4d189dcc841064dd7c1e7c3cbac30a
-
SHA1
c9bacb10214e78231cf6a32d3168076b06cf5121
-
SHA256
d2e5302008e1f153faccc136644f29525ba3075c98354ad0f3a8589bbd53cffe
-
SHA512
8ae42c5019dc52c7e44110fa0e3cc75268e372c29b33123b726a3ff928013d99ba5ecb9da12b0c4e09f8a7d3096ca084f783abe7b915ebd8470c0e4549b7e053
Malware Config
Signatures
-
BazarBackdoor 3 IoCs
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
Processes:
description flow ioc HTTP URL 10 https://194.87.145.86/10d4941a3a1a73d73b6e1d170a45a2ea/2 HTTP URL 11 https://194.87.145.86/10d4941a3a1a73d73b6e1d170a45a2ea/2 HTTP URL 12 https://194.87.145.86/10d4941a3a1a73d73b6e1d170a45a2ea/2