General

  • Target

    2775f0156a394e76f16441e1a91c877323ef92d731370c87bbafb1481843b8f8

  • Size

    136KB

  • Sample

    220220-k4twwsbhgr

  • MD5

    b9e7cdd63db7ff765efeaabd0a85ca59

  • SHA1

    7e300cb3e4dc52eaff8dc082c687442df84194c7

  • SHA256

    2775f0156a394e76f16441e1a91c877323ef92d731370c87bbafb1481843b8f8

  • SHA512

    800e61e0ca304d84a8da9ffd056ccec3c255c8e731f8f5d08f95b70aee65fbace7b6dff9faa0fc6ee0721da8f08cc91ecf14793ef150143dee68dff492bbcacf

Malware Config

Targets

    • Target

      2775f0156a394e76f16441e1a91c877323ef92d731370c87bbafb1481843b8f8

    • Size

      136KB

    • MD5

      b9e7cdd63db7ff765efeaabd0a85ca59

    • SHA1

      7e300cb3e4dc52eaff8dc082c687442df84194c7

    • SHA256

      2775f0156a394e76f16441e1a91c877323ef92d731370c87bbafb1481843b8f8

    • SHA512

      800e61e0ca304d84a8da9ffd056ccec3c255c8e731f8f5d08f95b70aee65fbace7b6dff9faa0fc6ee0721da8f08cc91ecf14793ef150143dee68dff492bbcacf

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • Bazar/Team9 Loader payload

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Executes dropped EXE

    • Tries to connect to .bazar domain

      Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Remote System Discovery

1
T1018

Tasks