Analysis
-
max time kernel
132s -
max time network
141s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
10-11-2020 11:21
Static task
static1
Behavioral task
behavioral1
Sample
a63664c9f44f5e5b2e2537c844a0792db3b68fe822c9785075d3e5e76394f5ad.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
a63664c9f44f5e5b2e2537c844a0792db3b68fe822c9785075d3e5e76394f5ad.exe
Resource
win10v20201028
General
-
Target
a63664c9f44f5e5b2e2537c844a0792db3b68fe822c9785075d3e5e76394f5ad.exe
-
Size
330KB
-
MD5
b38a883c02ea265b03166cb902e4db4b
-
SHA1
d7630b56d299445cf64e810e7c7dbb59a7572145
-
SHA256
a63664c9f44f5e5b2e2537c844a0792db3b68fe822c9785075d3e5e76394f5ad
-
SHA512
ac8f49a1592ef2bcc6e2a6093589767607d8bec6f5fbf084f286c814f62c5cfe83e489b3cad780e06c120de3fbacbc8302e63b6571784ab3ecad51f6bf9b65ee
Malware Config
Signatures
-
BazarBackdoor 1 IoCs
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
Processes:
description flow ioc HTTP URL 7 https://194.87.145.86/72c5e676b29f5ec54d226eb16133c4da/4
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2044-0-0x000007FEF6270000-0x000007FEF64EA000-memory.dmpFilesize
2.5MB