General

  • Target

    accessClean.jpg.dll

  • Size

    697KB

  • Sample

    211005-q6hvasacaj

  • MD5

    881b324a90273c109096ad480a147376

  • SHA1

    93e5854614e861693a5d930c132ca4674bf9703d

  • SHA256

    fd191c44be496e249149130aca11cfcc5db336f961c0ea406672c2acb59ca6a0

  • SHA512

    a9658fccd3ad8dd73ed68c208006b4772a2774cd0fa6cf3172f6f2a9d43e23cf9f44b616fc4ef0eff46d1f753c85398747e52954ead82ca81844262708ac5e37

Malware Config

Targets

    • Target

      accessClean.jpg.dll

    • Size

      697KB

    • MD5

      881b324a90273c109096ad480a147376

    • SHA1

      93e5854614e861693a5d930c132ca4674bf9703d

    • SHA256

      fd191c44be496e249149130aca11cfcc5db336f961c0ea406672c2acb59ca6a0

    • SHA512

      a9658fccd3ad8dd73ed68c208006b4772a2774cd0fa6cf3172f6f2a9d43e23cf9f44b616fc4ef0eff46d1f753c85398747e52954ead82ca81844262708ac5e37

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • BazarBackdoor

      Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

    • Bazar/Team9 Backdoor payload

    • Bazar/Team9 Loader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks