General
-
Target
aprilAccessWindows...hTa
-
Size
3KB
-
Sample
210930-by8y7agbbp
-
MD5
a7297781b5aecf4513d5a7a866e6281a
-
SHA1
a2c2d1365a122bd28b23426db3807ca712bc354a
-
SHA256
96d5aaa8342c344fdae21fe8fc414bed055f075435129e9e81d77667be7bb946
-
SHA512
09b297ecf0dbc561d3e8b249ce3bfacb1a17000e507caf116778656b665262a8144a2190f844c087f7e4ce357f656888c5e6867650739ebcd51b91330a6248d2
Static task
static1
Behavioral task
behavioral1
Sample
aprilAccessWindows...hTa
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
aprilAccessWindows...hTa
Resource
win10v20210408
Malware Config
Targets
-
-
Target
aprilAccessWindows...hTa
-
Size
3KB
-
MD5
a7297781b5aecf4513d5a7a866e6281a
-
SHA1
a2c2d1365a122bd28b23426db3807ca712bc354a
-
SHA256
96d5aaa8342c344fdae21fe8fc414bed055f075435129e9e81d77667be7bb946
-
SHA512
09b297ecf0dbc561d3e8b249ce3bfacb1a17000e507caf116778656b665262a8144a2190f844c087f7e4ce357f656888c5e6867650739ebcd51b91330a6248d2
Score10/10-
BazarBackdoor
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
-
Bazar/Team9 Backdoor payload
-
Bazar/Team9 Loader payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Tries to connect to .bazar domain
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-