General

  • Target

    0e1d5d891662f275badff2f98e24600d36db462bd30f84fba71ebf67142b460b

  • Size

    481KB

  • Sample

    220128-wjy6nahggn

  • MD5

    300ebc9b82049ce2f97a7669e8d71247

  • SHA1

    dd3421cf241ec2058167122ce6af0184fb1666ce

  • SHA256

    0e1d5d891662f275badff2f98e24600d36db462bd30f84fba71ebf67142b460b

  • SHA512

    f5252183760db2a9d7c2a70fd1c8858fbf1218ae394ce863fd5045632598f2aabe0bc27b958b7a5771b09a532b0cf811b64aafdffee9219bd0b27ce255e0009a

Malware Config

Targets

    • Target

      0e1d5d891662f275badff2f98e24600d36db462bd30f84fba71ebf67142b460b

    • Size

      481KB

    • MD5

      300ebc9b82049ce2f97a7669e8d71247

    • SHA1

      dd3421cf241ec2058167122ce6af0184fb1666ce

    • SHA256

      0e1d5d891662f275badff2f98e24600d36db462bd30f84fba71ebf67142b460b

    • SHA512

      f5252183760db2a9d7c2a70fd1c8858fbf1218ae394ce863fd5045632598f2aabe0bc27b958b7a5771b09a532b0cf811b64aafdffee9219bd0b27ce255e0009a

    • AnchorDNS Backdoor

      A backdoor which communicates with C2 through DNS, attributed to the creators of Trickbot and Bazar.

    • Detected AnchorDNS Backdoor

      Sample triggered yara rules associated with the AnchorDNS malware family.

    • suricata: ET MALWARE Win32/TrickBot Anchor Variant Style External IP Check

      suricata: ET MALWARE Win32/TrickBot Anchor Variant Style External IP Check

    • Sets DLL path for service in the registry

    • Tries to connect to .bazar domain

      Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

    • Deletes itself

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks