General
-
Target
accessClean.jpg.dll
-
Size
697KB
-
Sample
211005-zqr8gaacg5
-
MD5
881b324a90273c109096ad480a147376
-
SHA1
93e5854614e861693a5d930c132ca4674bf9703d
-
SHA256
fd191c44be496e249149130aca11cfcc5db336f961c0ea406672c2acb59ca6a0
-
SHA512
a9658fccd3ad8dd73ed68c208006b4772a2774cd0fa6cf3172f6f2a9d43e23cf9f44b616fc4ef0eff46d1f753c85398747e52954ead82ca81844262708ac5e37
Static task
static1
Behavioral task
behavioral1
Sample
accessClean.jpg.dll
Resource
win10-en-20210920
Malware Config
Targets
-
-
Target
accessClean.jpg.dll
-
Size
697KB
-
MD5
881b324a90273c109096ad480a147376
-
SHA1
93e5854614e861693a5d930c132ca4674bf9703d
-
SHA256
fd191c44be496e249149130aca11cfcc5db336f961c0ea406672c2acb59ca6a0
-
SHA512
a9658fccd3ad8dd73ed68c208006b4772a2774cd0fa6cf3172f6f2a9d43e23cf9f44b616fc4ef0eff46d1f753c85398747e52954ead82ca81844262708ac5e37
Score10/10-
BazarBackdoor
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
-
Bazar/Team9 Backdoor payload
-
Bazar/Team9 Loader payload
-
Tries to connect to .bazar domain
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-