General

  • Target

    2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775

  • Size

    481KB

  • Sample

    220128-vxl8kshdh5

  • MD5

    5d83bd79bc681fb123e9c4078437b48f

  • SHA1

    fa98074dc18ad7e2d357b5d168c00a91256d87d1

  • SHA256

    2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775

  • SHA512

    933919fea47ff5102564f6597f1ed277e699cdd746835a0039fa531e50b8fbb18532626a6900b5c18e88d15d2f6173f41c3b2d8ccf9109802aaf27a502ab0dc6

Malware Config

Targets

    • Target

      2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775

    • Size

      481KB

    • MD5

      5d83bd79bc681fb123e9c4078437b48f

    • SHA1

      fa98074dc18ad7e2d357b5d168c00a91256d87d1

    • SHA256

      2c446cad1e15d82521022281b81f905867e33e9ae33c3e7e4959972d40230775

    • SHA512

      933919fea47ff5102564f6597f1ed277e699cdd746835a0039fa531e50b8fbb18532626a6900b5c18e88d15d2f6173f41c3b2d8ccf9109802aaf27a502ab0dc6

    • AnchorDNS Backdoor

      A backdoor which communicates with C2 through DNS, attributed to the creators of Trickbot and Bazar.

    • Detected AnchorDNS Backdoor

      Sample triggered yara rules associated with the AnchorDNS malware family.

    • Sets DLL path for service in the registry

    • Tries to connect to .bazar domain

      Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

    • Deletes itself

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks