Analysis

  • max time kernel
    154s
  • max time network
    156s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    28-09-2021 09:44

General

  • Target

    def6bfcf7cb0b0e3bfdfdf5857e9823fdf133f586a7addd1b76e94c946006b26.bin.sample.exe

  • Size

    206KB

  • MD5

    624acfbb640b05a586ecf7e3f8db85d0

  • SHA1

    d08a1af53d0eadb8ae83e61179992d3b5a89c714

  • SHA256

    def6bfcf7cb0b0e3bfdfdf5857e9823fdf133f586a7addd1b76e94c946006b26

  • SHA512

    ff77c06a0929906d9d370bc4925fb576209c80bad2c48f68bf0a4696eece51b585b4abe6d59c12b6f5f3c7bf75195161f0eae86a8284e2e153ef02b7914bf4dc

Malware Config

Signatures

  • Bazar Loader 64 IoCs

    Detected loader normally used to deploy BazarBackdoor malware.

  • BazarBackdoor 64 IoCs

    Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

  • Tries to connect to .bazar domain 64 IoCs

    Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

  • Looks up external IP address via web service 7 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • C:\Users\Admin\AppData\Local\Temp\def6bfcf7cb0b0e3bfdfdf5857e9823fdf133f586a7addd1b76e94c946006b26.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\def6bfcf7cb0b0e3bfdfdf5857e9823fdf133f586a7addd1b76e94c946006b26.bin.sample.exe"
    1⤵
    • Bazar Loader
    • BazarBackdoor
    PID:568

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads