General

  • Target

    88da57ba_by_Libranalysis

  • Size

    293KB

  • Sample

    210503-dw1yzwkea6

  • MD5

    88da57baad066838d62daa0d17658eb0

  • SHA1

    c9d47b8cf3debfe3f714c6eb497829a8ad2bd1fc

  • SHA256

    f82a3b15901da167017395e4158995302d01abbb9b7f259465eca8f66f42fb5c

  • SHA512

    561401ec068bea4d1907ca81f66fceeb21d93fbca3e1fc1fafd6c68bc7df465dbaf988e4bbd8f38a54dceade57f12428b9ec20c5e5a43c45e4a1c662dc4919d0

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://otusmail.com/b/vegas.dll

Targets

    • Target

      88da57ba_by_Libranalysis

    • Size

      293KB

    • MD5

      88da57baad066838d62daa0d17658eb0

    • SHA1

      c9d47b8cf3debfe3f714c6eb497829a8ad2bd1fc

    • SHA256

      f82a3b15901da167017395e4158995302d01abbb9b7f259465eca8f66f42fb5c

    • SHA512

      561401ec068bea4d1907ca81f66fceeb21d93fbca3e1fc1fafd6c68bc7df465dbaf988e4bbd8f38a54dceade57f12428b9ec20c5e5a43c45e4a1c662dc4919d0

    Score
    10/10
    • BazarBackdoor

      Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks