General

  • Target

    ccd6ca35e57022e0de7daff6fdb315c19bcbeb3d215cfac91fa93a782c9efdcb.bin.sample

  • Size

    204KB

  • Sample

    210928-y8sfhsdad4

  • MD5

    217725e4a69e8ad97a1d18cfc803cf03

  • SHA1

    314da84f1007bdb75a87e8ae0c9767098efbec50

  • SHA256

    ccd6ca35e57022e0de7daff6fdb315c19bcbeb3d215cfac91fa93a782c9efdcb

  • SHA512

    7d44f0c9fcdb5fe62d0197cccbbae6b69e9f94c14058820e932ee8e1264ee0d87ab595c050aa1af591dd6fc730a3341029285c072a7fe041990d8b36bb35edd1

Malware Config

Targets

    • Target

      ccd6ca35e57022e0de7daff6fdb315c19bcbeb3d215cfac91fa93a782c9efdcb.bin.sample

    • Size

      204KB

    • MD5

      217725e4a69e8ad97a1d18cfc803cf03

    • SHA1

      314da84f1007bdb75a87e8ae0c9767098efbec50

    • SHA256

      ccd6ca35e57022e0de7daff6fdb315c19bcbeb3d215cfac91fa93a782c9efdcb

    • SHA512

      7d44f0c9fcdb5fe62d0197cccbbae6b69e9f94c14058820e932ee8e1264ee0d87ab595c050aa1af591dd6fc730a3341029285c072a7fe041990d8b36bb35edd1

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • BazarBackdoor

      Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

    • Tries to connect to .bazar domain

      Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks