General
-
Target
decree_010.04.2021.doc
-
Size
76KB
-
Sample
211005-p6sh3ahge2
-
MD5
dc7c830fca5fa6c17aa39736748ae71e
-
SHA1
b44ee6ebeafa18f7bd08ffaea7f048d9d7f10b6d
-
SHA256
f964cb1615386f5fcf67fe30dfd43c403a0614e21108522b99c7c0abda4270e5
-
SHA512
fb523982adc540b6d27c47a0e8f026f1a30b79cbe116f1b492c2cfd5ae5151554d9fddefb1b2529a52fc16f616361c5494183f5def182a7b9628461599b217b9
Static task
static1
Behavioral task
behavioral1
Sample
decree_010.04.2021.doc
Resource
win7v20210408
Behavioral task
behavioral2
Sample
decree_010.04.2021.doc
Resource
win10-en-20210920
Malware Config
Targets
-
-
Target
decree_010.04.2021.doc
-
Size
76KB
-
MD5
dc7c830fca5fa6c17aa39736748ae71e
-
SHA1
b44ee6ebeafa18f7bd08ffaea7f048d9d7f10b6d
-
SHA256
f964cb1615386f5fcf67fe30dfd43c403a0614e21108522b99c7c0abda4270e5
-
SHA512
fb523982adc540b6d27c47a0e8f026f1a30b79cbe116f1b492c2cfd5ae5151554d9fddefb1b2529a52fc16f616361c5494183f5def182a7b9628461599b217b9
Score10/10-
BazarBackdoor
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Bazar/Team9 Backdoor payload
-
Bazar/Team9 Loader payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-