General

  • Target

    5622189598fae2814a0f6a73a1d746c99777e1ec90e9b5bda156f15a6bfc2832

  • Size

    35.1MB

  • Sample

    211010-m5xehsfgd5

  • MD5

    4932b7fa81a500c5050ccf3a945077e3

  • SHA1

    13d7cf3a826274183d761bc4bcd16e68c069e14b

  • SHA256

    5622189598fae2814a0f6a73a1d746c99777e1ec90e9b5bda156f15a6bfc2832

  • SHA512

    bb3cda1748c8c6bdfb3ea9771ec658557f208911fa94f88f872f49d9d91eeea5c667ba6c7a366325b9498309d6a1381fab96c5a3929c9b150b653e456fc234fc

Malware Config

Targets

    • Target

      5622189598fae2814a0f6a73a1d746c99777e1ec90e9b5bda156f15a6bfc2832

    • Size

      35.1MB

    • MD5

      4932b7fa81a500c5050ccf3a945077e3

    • SHA1

      13d7cf3a826274183d761bc4bcd16e68c069e14b

    • SHA256

      5622189598fae2814a0f6a73a1d746c99777e1ec90e9b5bda156f15a6bfc2832

    • SHA512

      bb3cda1748c8c6bdfb3ea9771ec658557f208911fa94f88f872f49d9d91eeea5c667ba6c7a366325b9498309d6a1381fab96c5a3929c9b150b653e456fc234fc

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • Detected google phishing page

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Bazar/Team9 Loader payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks