General

  • Target

    9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a

  • Size

    43.5MB

  • Sample

    221119-pdg7maah38

  • MD5

    379eeae351cb074d4500be04d73bd116

  • SHA1

    1a7f13231d50e9e5b84bfe582576cdcfe7bceec0

  • SHA256

    9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a

  • SHA512

    282ea5c03502c2d8ab466d4ee80ef0ed286cd421c14dce00bd9267c6a405c8cbbe02487e20f209ba4852b1e3ddb1963801ad7f9558a7a30a7278722ee338f805

  • SSDEEP

    786432:Qn5lSOGApJPAHuXkw7/UQs2MMNixxG1cghRFbbraU3VvcMzztsIxH0:QnGgAOXkw22sx8cEFbbGKNzz/J0

Malware Config

Targets

    • Target

      9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a

    • Size

      43.5MB

    • MD5

      379eeae351cb074d4500be04d73bd116

    • SHA1

      1a7f13231d50e9e5b84bfe582576cdcfe7bceec0

    • SHA256

      9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a

    • SHA512

      282ea5c03502c2d8ab466d4ee80ef0ed286cd421c14dce00bd9267c6a405c8cbbe02487e20f209ba4852b1e3ddb1963801ad7f9558a7a30a7278722ee338f805

    • SSDEEP

      786432:Qn5lSOGApJPAHuXkw7/UQs2MMNixxG1cghRFbbraU3VvcMzztsIxH0:QnGgAOXkw22sx8cEFbbGKNzz/J0

    • BazarBackdoor

      Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

    • Bazar/Team9 Backdoor payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Discovery

System Information Discovery

1
T1082

Tasks