General

  • Target

    c4539adb4566822ab8dfe45aa3d5ca63.bin.zip

  • Size

    289KB

  • Sample

    210428-lc6q9r1wz6

  • MD5

    e62b7c290dc22f3500b0010cbfbb711b

  • SHA1

    5359d896659f2b3c582d67bd85feeccfdc96dd1d

  • SHA256

    c4ccfce36f30f5461c6d3a0eaf66c2fb5c520dfeafbbfe40805f0dbe638bf8e6

  • SHA512

    b88bb1fc904642e2bbc188196f19283c174bde0afa87dc0e43d02612cf1f2aec7801f5f307daf985245241a3af3b199262d97a3b62d01df9dc195bc4fd31a3dc

Score
10/10

Malware Config

Targets

    • Target

      c4539adb4566822ab8dfe45aa3d5ca63.bin

    • Size

      414KB

    • MD5

      c4539adb4566822ab8dfe45aa3d5ca63

    • SHA1

      921d255b8ff71329451315dbf4ce41729a33465e

    • SHA256

      665d2cbbe026c961b1506f5d45205959c817c7b69af4106a40e74186cee6eb94

    • SHA512

      4be038710a63341c865183e607a597eb8065779f03d0d4471da28aab4bc4735d6cecb47f11d0da19e5bdf1692e923f8c6e15ac0ec85819ca40aadfaf4ece9987

    Score
    10/10
    • BazarBackdoor

      Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

    • Bazar/Team9 Backdoor payload

    • Blocklisted process makes network request

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks