General

  • Target

    5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399

  • Size

    390KB

  • Sample

    220128-1a675aedd3

  • MD5

    14f60998a77261a97c719b05e246716b

  • SHA1

    3ed09498214d93c9ec14a15286546d242ad58943

  • SHA256

    5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399

  • SHA512

    cbc039535a2ac2cb3398436098db7b008f03899cc765d397dc2a478a37742e3e542b15f8c1f27705a6d4b823eb72457bc2b5b5a1c763f592eb7b6724f0fba200

Malware Config

Targets

    • Target

      5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399

    • Size

      390KB

    • MD5

      14f60998a77261a97c719b05e246716b

    • SHA1

      3ed09498214d93c9ec14a15286546d242ad58943

    • SHA256

      5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399

    • SHA512

      cbc039535a2ac2cb3398436098db7b008f03899cc765d397dc2a478a37742e3e542b15f8c1f27705a6d4b823eb72457bc2b5b5a1c763f592eb7b6724f0fba200

    • AnchorDNS Backdoor

      A backdoor which communicates with C2 through DNS, attributed to the creators of Trickbot and Bazar.

    • Detected AnchorDNS Backdoor

      Sample triggered yara rules associated with the AnchorDNS malware family.

    • Sets DLL path for service in the registry

    • Tries to connect to .bazar domain

      Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks