General

  • Target

    ZlvFNj.dat

  • Size

    1.0MB

  • Sample

    210722-ddb7rhhaax

  • MD5

    6aec6aee754419c449358e21fc5cadea

  • SHA1

    76bf3a742f006eacbf948423b5154b9344b839da

  • SHA256

    2049636dacf350e2d08a2c977750ccbf4b8cc13732aac3863be940facd7a5989

  • SHA512

    98c9db31be8c1ca2ac08d4228d844a21af03a9f267b4dbc2b6ff2a2d140939fb2cbf93b20202c84a9b9c3cad57896da58f533e454e6aecc2a1b187c2fc26adee

Malware Config

Targets

    • Target

      ZlvFNj.dat

    • Size

      1.0MB

    • MD5

      6aec6aee754419c449358e21fc5cadea

    • SHA1

      76bf3a742f006eacbf948423b5154b9344b839da

    • SHA256

      2049636dacf350e2d08a2c977750ccbf4b8cc13732aac3863be940facd7a5989

    • SHA512

      98c9db31be8c1ca2ac08d4228d844a21af03a9f267b4dbc2b6ff2a2d140939fb2cbf93b20202c84a9b9c3cad57896da58f533e454e6aecc2a1b187c2fc26adee

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • BazarBackdoor

      Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

    • Bazar/Team9 Backdoor payload

    • Bazar/Team9 Loader payload

    • Blocklisted process makes network request

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Remote System Discovery

1
T1018

Process Discovery

1
T1057

System Information Discovery

1
T1082

Tasks