General

  • Target

    a0e3012469e311703c367ab48c15193f9406aa4026e40ed46de966c1cbd4e266

  • Size

    603KB

  • Sample

    220329-af2lqaghh9

  • MD5

    dac91ccf0929071e9db5b75be0f6a3a6

  • SHA1

    466b804c1c95145f7a5d06cee956610c16951372

  • SHA256

    a0e3012469e311703c367ab48c15193f9406aa4026e40ed46de966c1cbd4e266

  • SHA512

    ac17c66d673306603d4d5c5bde77131e09fd754f4367006f85abf846303a03ac65d356ee6151afc1b696ba23d6d9446410760187ed236e01633590ac3753ea69

Malware Config

Targets

    • Target

      a0e3012469e311703c367ab48c15193f9406aa4026e40ed46de966c1cbd4e266

    • Size

      603KB

    • MD5

      dac91ccf0929071e9db5b75be0f6a3a6

    • SHA1

      466b804c1c95145f7a5d06cee956610c16951372

    • SHA256

      a0e3012469e311703c367ab48c15193f9406aa4026e40ed46de966c1cbd4e266

    • SHA512

      ac17c66d673306603d4d5c5bde77131e09fd754f4367006f85abf846303a03ac65d356ee6151afc1b696ba23d6d9446410760187ed236e01633590ac3753ea69

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • Bazar/Team9 Loader payload

    • Executes dropped EXE

    • Tries to connect to .bazar domain

      Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Remote System Discovery

1
T1018

Tasks