General
-
Target
ccfa86896ffc44125e762009e0301fa662ce58cc87d71e457873d741f43d8d5b
-
Size
137KB
-
Sample
220328-zb5v1sahbp
-
MD5
80a0d6819d431dbde0661de16f1487af
-
SHA1
c57b6cdc3852bd11adf5f1eb3f5b8ec077037093
-
SHA256
ccfa86896ffc44125e762009e0301fa662ce58cc87d71e457873d741f43d8d5b
-
SHA512
d1802939f331e215be388d8b9187385ed50aea27e73217fba41f413cf101e4ae6ab9d8977e6fde9f8d9221c01a9453a62caad1e3ea9b3e77fd48f4514d95d6ff
Static task
static1
Behavioral task
behavioral1
Sample
ccfa86896ffc44125e762009e0301fa662ce58cc87d71e457873d741f43d8d5b.dll
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
ccfa86896ffc44125e762009e0301fa662ce58cc87d71e457873d741f43d8d5b.dll
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
ccfa86896ffc44125e762009e0301fa662ce58cc87d71e457873d741f43d8d5b
-
Size
137KB
-
MD5
80a0d6819d431dbde0661de16f1487af
-
SHA1
c57b6cdc3852bd11adf5f1eb3f5b8ec077037093
-
SHA256
ccfa86896ffc44125e762009e0301fa662ce58cc87d71e457873d741f43d8d5b
-
SHA512
d1802939f331e215be388d8b9187385ed50aea27e73217fba41f413cf101e4ae6ab9d8977e6fde9f8d9221c01a9453a62caad1e3ea9b3e77fd48f4514d95d6ff
Score8/10-
Blocklisted process makes network request
-
Tries to connect to .bazar domain
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-