General
-
Target
eea37d92dc98bb28cdd5b999b8a9d9d598391d494a1984813d26322b8b857536
-
Size
481KB
-
Sample
220128-z2hs6sdffq
-
MD5
b05dc02b630924cb951e5e999269a9e7
-
SHA1
49f6d0beca33af85e8a5ba64aa9e848ce250188b
-
SHA256
eea37d92dc98bb28cdd5b999b8a9d9d598391d494a1984813d26322b8b857536
-
SHA512
2a2cf9bfa42fe91a1d3db533653f531625e43effb0f169567e411a435f6b1c0998a4329559648e5d864b7333cd8230abc8a5b39df91fa3309ac88dd6f0e3342c
Behavioral task
behavioral1
Sample
eea37d92dc98bb28cdd5b999b8a9d9d598391d494a1984813d26322b8b857536.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
eea37d92dc98bb28cdd5b999b8a9d9d598391d494a1984813d26322b8b857536.exe
Resource
win10-en-20211208
Malware Config
Targets
-
-
Target
eea37d92dc98bb28cdd5b999b8a9d9d598391d494a1984813d26322b8b857536
-
Size
481KB
-
MD5
b05dc02b630924cb951e5e999269a9e7
-
SHA1
49f6d0beca33af85e8a5ba64aa9e848ce250188b
-
SHA256
eea37d92dc98bb28cdd5b999b8a9d9d598391d494a1984813d26322b8b857536
-
SHA512
2a2cf9bfa42fe91a1d3db533653f531625e43effb0f169567e411a435f6b1c0998a4329559648e5d864b7333cd8230abc8a5b39df91fa3309ac88dd6f0e3342c
Score10/10-
Detected AnchorDNS Backdoor
Sample triggered yara rules associated with the AnchorDNS malware family.
-
suricata: ET MALWARE Win32/TrickBot Anchor Variant Style External IP Check
suricata: ET MALWARE Win32/TrickBot Anchor Variant Style External IP Check
-
Sets DLL path for service in the registry
-
Tries to connect to .bazar domain
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
-
Deletes itself
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-