General

  • Target

    d5c03179945956647ebd5c1481506cec6cd412bc624872942bbf5f7082536b06

  • Size

    1.7MB

  • Sample

    220118-2999hadhgl

  • MD5

    96bf23090b0733562da8bb1444dc4078

  • SHA1

    2382fc9ac2e24e153826908f3d7ccea3d19f62cd

  • SHA256

    d5c03179945956647ebd5c1481506cec6cd412bc624872942bbf5f7082536b06

  • SHA512

    fcf83721975533034e56069d5880fe4f7cbbd618d288ca7a0e69765ca62cc02a5e70621d8bef68749b084f76cbbf79d5115fda78bd12f34ff3c5a6d64454a0a4

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      d5c03179945956647ebd5c1481506cec6cd412bc624872942bbf5f7082536b06

    • Size

      1.7MB

    • MD5

      96bf23090b0733562da8bb1444dc4078

    • SHA1

      2382fc9ac2e24e153826908f3d7ccea3d19f62cd

    • SHA256

      d5c03179945956647ebd5c1481506cec6cd412bc624872942bbf5f7082536b06

    • SHA512

      fcf83721975533034e56069d5880fe4f7cbbd618d288ca7a0e69765ca62cc02a5e70621d8bef68749b084f76cbbf79d5115fda78bd12f34ff3c5a6d64454a0a4

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Bazar/Team9 Loader payload

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks