General
-
Target
Stolen Images Evidence.zip
-
Size
5KB
-
Sample
211007-wdb4yadacl
-
MD5
7630e39437bc9c3f00b7a6dbd0ba6ad8
-
SHA1
4c00adeaf01998bb927b7a6447f7fee443a3da25
-
SHA256
f003e8b9aaf7890828c537402950f4e6f72196fe69624cb3ec76a05ae917db42
-
SHA512
1069108af3db3ac200c4819eb6a2403fba33b57621f4d80ddd95ffce195a98bed434c7913f974e31253a2f095e3b82ac8329fde5b53135a7cedd1246cd6a8d0b
Static task
static1
Behavioral task
behavioral1
Sample
Stolen Images Evidence.js
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Stolen Images Evidence.js
Resource
win10v20210408
Malware Config
Extracted
http://mopuketo.space/222g100/index.php
Targets
-
-
Target
Stolen Images Evidence.js
-
Size
18KB
-
MD5
90efa8d6677a45ea3397ab8c2bb5bfcd
-
SHA1
451c972435ed6e4a3abe1d390ff52691d84d20fa
-
SHA256
7e014f3533333cbbae1dcd3505a25990d07e7f4a3684fb8b35f744d02215b20a
-
SHA512
809b4dcb00b016b537279fadec1ace549b6848dcb37a20d0548b7036a2e103e5b4eb7b0f45749fd50a3bae17310ca797362181150fed5be2169f2cb6ac6f9c9a
Score10/10-
BazarBackdoor
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
-
Bazar/Team9 Backdoor payload
-
Bazar/Team9 Loader payload
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-