General

  • Target

    rest.exe

  • Size

    385KB

  • Sample

    210505-mq8bqqpk6x

  • MD5

    96764a0a62e66a147a3d4db0e59a6e34

  • SHA1

    1364419833344aa6ab3f301059d43b9506197501

  • SHA256

    9663dc275239aa93ceccedae7a0d54e10def18dd177d231264a323a4175a23d4

  • SHA512

    71855c2e52c1b65697a6a0843373d2039dc50db4155415dd7c76707870cdf05b1a829145837f3ec10801bdfa79a5dc44afb83b87da78472533394006c8cf38e7

Malware Config

Targets

    • Target

      rest.exe

    • Size

      385KB

    • MD5

      96764a0a62e66a147a3d4db0e59a6e34

    • SHA1

      1364419833344aa6ab3f301059d43b9506197501

    • SHA256

      9663dc275239aa93ceccedae7a0d54e10def18dd177d231264a323a4175a23d4

    • SHA512

      71855c2e52c1b65697a6a0843373d2039dc50db4155415dd7c76707870cdf05b1a829145837f3ec10801bdfa79a5dc44afb83b87da78472533394006c8cf38e7

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • BazarBackdoor

      Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

    • Bazar/Team9 Backdoor payload

    • Bazar/Team9 Loader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks