General

  • Target

    eea37d92dc98bb28cdd5b999b8a9d9d598391d494a1984813d26322b8b857536

  • Size

    481KB

  • Sample

    220128-z2hs6sdffq

  • MD5

    b05dc02b630924cb951e5e999269a9e7

  • SHA1

    49f6d0beca33af85e8a5ba64aa9e848ce250188b

  • SHA256

    eea37d92dc98bb28cdd5b999b8a9d9d598391d494a1984813d26322b8b857536

  • SHA512

    2a2cf9bfa42fe91a1d3db533653f531625e43effb0f169567e411a435f6b1c0998a4329559648e5d864b7333cd8230abc8a5b39df91fa3309ac88dd6f0e3342c

Malware Config

Targets

    • Target

      eea37d92dc98bb28cdd5b999b8a9d9d598391d494a1984813d26322b8b857536

    • Size

      481KB

    • MD5

      b05dc02b630924cb951e5e999269a9e7

    • SHA1

      49f6d0beca33af85e8a5ba64aa9e848ce250188b

    • SHA256

      eea37d92dc98bb28cdd5b999b8a9d9d598391d494a1984813d26322b8b857536

    • SHA512

      2a2cf9bfa42fe91a1d3db533653f531625e43effb0f169567e411a435f6b1c0998a4329559648e5d864b7333cd8230abc8a5b39df91fa3309ac88dd6f0e3342c

    • AnchorDNS Backdoor

      A backdoor which communicates with C2 through DNS, attributed to the creators of Trickbot and Bazar.

    • Detected AnchorDNS Backdoor

      Sample triggered yara rules associated with the AnchorDNS malware family.

    • suricata: ET MALWARE Win32/TrickBot Anchor Variant Style External IP Check

      suricata: ET MALWARE Win32/TrickBot Anchor Variant Style External IP Check

    • Sets DLL path for service in the registry

    • Tries to connect to .bazar domain

      Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

    • Deletes itself

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks