General
-
Target
5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399
-
Size
390KB
-
Sample
220128-1a675aedd3
-
MD5
14f60998a77261a97c719b05e246716b
-
SHA1
3ed09498214d93c9ec14a15286546d242ad58943
-
SHA256
5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399
-
SHA512
cbc039535a2ac2cb3398436098db7b008f03899cc765d397dc2a478a37742e3e542b15f8c1f27705a6d4b823eb72457bc2b5b5a1c763f592eb7b6724f0fba200
Behavioral task
behavioral1
Sample
5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399.exe
Resource
win10-en-20211208
Malware Config
Targets
-
-
Target
5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399
-
Size
390KB
-
MD5
14f60998a77261a97c719b05e246716b
-
SHA1
3ed09498214d93c9ec14a15286546d242ad58943
-
SHA256
5739549850fe635fc0ac5de81ce1fd495669fcabc1b8ede35b82a22093c86399
-
SHA512
cbc039535a2ac2cb3398436098db7b008f03899cc765d397dc2a478a37742e3e542b15f8c1f27705a6d4b823eb72457bc2b5b5a1c763f592eb7b6724f0fba200
Score10/10-
Detected AnchorDNS Backdoor
Sample triggered yara rules associated with the AnchorDNS malware family.
-
Sets DLL path for service in the registry
-
Tries to connect to .bazar domain
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-