General

  • Target

    LtVlkJg.bin

  • Size

    186KB

  • Sample

    211025-wsetdagea8

  • MD5

    e7836b449e9d7ab89817c7f54d5b1700

  • SHA1

    bae8e214ea4080381a8eea88320726a074d120c1

  • SHA256

    1b081afae6c33f87452aac5f1ded863f0229d13ff4b36e67c1d65d3c2d18de6d

  • SHA512

    4084af9c795f720803ba35504b4f9a7884e089deb8ad382479f484dc8677898625f8bd009ac1f31fa96e0459f723d6cea1436f4125beb3071afa0a43ca3b3e53

Malware Config

Targets

    • Target

      LtVlkJg.bin

    • Size

      186KB

    • MD5

      e7836b449e9d7ab89817c7f54d5b1700

    • SHA1

      bae8e214ea4080381a8eea88320726a074d120c1

    • SHA256

      1b081afae6c33f87452aac5f1ded863f0229d13ff4b36e67c1d65d3c2d18de6d

    • SHA512

      4084af9c795f720803ba35504b4f9a7884e089deb8ad382479f484dc8677898625f8bd009ac1f31fa96e0459f723d6cea1436f4125beb3071afa0a43ca3b3e53

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Bazar/Team9 Loader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks