General
-
Target
2022-2-4-2ac627c145f9c76d3052d8d82db8fa21.bin
-
Size
142KB
-
Sample
220203-xxgdfadab6
-
MD5
2ac627c145f9c76d3052d8d82db8fa21
-
SHA1
623b905cf7c268147bc29ce4715fb98a3b58e7d7
-
SHA256
8081638587d1ad2cb3e79705c8c370b5be3b0b8b4faaf0e9271714f90eb4370d
-
SHA512
12d07b1946f3eccad7a59d55cd3d3c2a9802fddd62c7f6db272d51c31e62624f28e9d8d2170a6e7724ac67a7bfc2ecfc2b1f5469bf0546a9eca122f58130196e
Static task
static1
Behavioral task
behavioral1
Sample
2022-2-4-2ac627c145f9c76d3052d8d82db8fa21.xls
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2022-2-4-2ac627c145f9c76d3052d8d82db8fa21.xls
Resource
win10v2004-en-20220112
Malware Config
Extracted
http://goyaluat.vmesh.in/0v6kcny/CG/
https://mars.srl/wp-admin/7Ffk6LLN2Xs2W/
http://franmulero.es/mbx/8c5RBJx6/
http://varafood.com/Ajax/cnM91G/
https://7jcat.com/wp-content/t/
http://blog.centralhome.hu/wp-content/pB1RfPCnBlS1WfpcOL/
http://zimrights.co.zw/oldsite/k0EoCWycU9tNo1d/
https://mudhands.com/error/BfH/
http://albatrospatagonia.com/phkcvt/t53ceSMDqgPQlq/
http://mapcommunications.co.zw/wp-admin/mdRRbSdU3aB7Xpx6z/
http://odconsult.co.uk/ALFA_DATA/HHr0FqOXAn62/
http://dushkin.net/img/bhQSTNicEMtNQxP/
Targets
-
-
Target
2022-2-4-2ac627c145f9c76d3052d8d82db8fa21.bin
-
Size
142KB
-
MD5
2ac627c145f9c76d3052d8d82db8fa21
-
SHA1
623b905cf7c268147bc29ce4715fb98a3b58e7d7
-
SHA256
8081638587d1ad2cb3e79705c8c370b5be3b0b8b4faaf0e9271714f90eb4370d
-
SHA512
12d07b1946f3eccad7a59d55cd3d3c2a9802fddd62c7f6db272d51c31e62624f28e9d8d2170a6e7724ac67a7bfc2ecfc2b1f5469bf0546a9eca122f58130196e
Score10/10-
BazarBackdoor
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Bazar/Team9 Backdoor payload
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-