General

  • Target

    decree_010.04.2021.doc

  • Size

    76KB

  • Sample

    211005-p6sh3ahge2

  • MD5

    dc7c830fca5fa6c17aa39736748ae71e

  • SHA1

    b44ee6ebeafa18f7bd08ffaea7f048d9d7f10b6d

  • SHA256

    f964cb1615386f5fcf67fe30dfd43c403a0614e21108522b99c7c0abda4270e5

  • SHA512

    fb523982adc540b6d27c47a0e8f026f1a30b79cbe116f1b492c2cfd5ae5151554d9fddefb1b2529a52fc16f616361c5494183f5def182a7b9628461599b217b9

Malware Config

Targets

    • Target

      decree_010.04.2021.doc

    • Size

      76KB

    • MD5

      dc7c830fca5fa6c17aa39736748ae71e

    • SHA1

      b44ee6ebeafa18f7bd08ffaea7f048d9d7f10b6d

    • SHA256

      f964cb1615386f5fcf67fe30dfd43c403a0614e21108522b99c7c0abda4270e5

    • SHA512

      fb523982adc540b6d27c47a0e8f026f1a30b79cbe116f1b492c2cfd5ae5151554d9fddefb1b2529a52fc16f616361c5494183f5def182a7b9628461599b217b9

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • BazarBackdoor

      Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Bazar/Team9 Backdoor payload

    • Bazar/Team9 Loader payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks