General

  • Target

    c59893a152b5eb07b5d95d26bd7d2208124c70b4.dll

  • Size

    186KB

  • Sample

    211025-z7zc4sgfe7

  • MD5

    78de1f5c42d0446bd01c29e4707d432c

  • SHA1

    c59893a152b5eb07b5d95d26bd7d2208124c70b4

  • SHA256

    bc5b812f4681af6921012d979b6306137a142df19dca1b9c2fcd393c9b4d7f6c

  • SHA512

    3d8f8f2ad7f6eefce3cc960797c32a402f08d5766b7cb45b60166a53e5d46304ddf7af4d24f42589363789fbe1178f5d2232c1e7f9c89a09c3f40f2bfbc171a8

Malware Config

Targets

    • Target

      c59893a152b5eb07b5d95d26bd7d2208124c70b4.dll

    • Size

      186KB

    • MD5

      78de1f5c42d0446bd01c29e4707d432c

    • SHA1

      c59893a152b5eb07b5d95d26bd7d2208124c70b4

    • SHA256

      bc5b812f4681af6921012d979b6306137a142df19dca1b9c2fcd393c9b4d7f6c

    • SHA512

      3d8f8f2ad7f6eefce3cc960797c32a402f08d5766b7cb45b60166a53e5d46304ddf7af4d24f42589363789fbe1178f5d2232c1e7f9c89a09c3f40f2bfbc171a8

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Bazar/Team9 Loader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks