General

  • Target

    6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e

  • Size

    603KB

  • Sample

    220329-agqkvadbal

  • MD5

    9a8c7ae7424367b8c24d5d70b9c1c867

  • SHA1

    bc058fd1fc2cdc2522f2f17f980b2201951cb4ec

  • SHA256

    6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e

  • SHA512

    3235fd9ad888fbe95ddf6da8d75f0713e1a93b442027abc9f6d83ab9314e7981e699a3e5502568b26e9b403996fa63cee96ab360a1f5a770c1b1f495e5389deb

Malware Config

Targets

    • Target

      6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e

    • Size

      603KB

    • MD5

      9a8c7ae7424367b8c24d5d70b9c1c867

    • SHA1

      bc058fd1fc2cdc2522f2f17f980b2201951cb4ec

    • SHA256

      6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e

    • SHA512

      3235fd9ad888fbe95ddf6da8d75f0713e1a93b442027abc9f6d83ab9314e7981e699a3e5502568b26e9b403996fa63cee96ab360a1f5a770c1b1f495e5389deb

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • Bazar/Team9 Loader payload

    • Executes dropped EXE

    • Tries to connect to .bazar domain

      Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Remote System Discovery

1
T1018

Tasks