General

  • Target

    malware-bahaya-rt3ret3.exe

  • Size

    236KB

  • Sample

    210927-m6eabsgfc6

  • MD5

    efa4b2e7d7016a1f80efff5840de3a18

  • SHA1

    04606786daa6313867c7ada1f0c9c925d9b602fb

  • SHA256

    291c573996c647508544e8e21bd2764e6e4c834d53d6d2c8903a0001c783764b

  • SHA512

    11446166922efb329d547ce329fb3ed70a3a99c1c037533beaecefd16d4a67c9dc9201592b0428a06fd956e4bb5caf3f7997a86200792e3e29a041f0963b2ced

Malware Config

Targets

    • Target

      malware-bahaya-rt3ret3.exe

    • Size

      236KB

    • MD5

      efa4b2e7d7016a1f80efff5840de3a18

    • SHA1

      04606786daa6313867c7ada1f0c9c925d9b602fb

    • SHA256

      291c573996c647508544e8e21bd2764e6e4c834d53d6d2c8903a0001c783764b

    • SHA512

      11446166922efb329d547ce329fb3ed70a3a99c1c037533beaecefd16d4a67c9dc9201592b0428a06fd956e4bb5caf3f7997a86200792e3e29a041f0963b2ced

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • Bazar/Team9 Loader payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Tasks