General

  • Target

    я его боюсь этого пидораса ебаного.mp4

  • Size

    513KB

  • Sample

    230724-zzq2rshf8t

  • MD5

    1d5a3ef77c864d185322f524d1939463

  • SHA1

    52df87b92e3340a97beb4bb4e2916981b32d01a9

  • SHA256

    25cdf658c6e625b0056a1f737dc039ab6de8e25015ca0433b593fe448d07aab3

  • SHA512

    6947c42f49113d48aea5cc5d2e919e1852234f79a6a7eacd807bb04420b85eb17d5988309aaa923afafb6ad2e7cd4fa84f719571958f058699baced987230fef

  • SSDEEP

    12288:U14S+RBfnkuJm3FYyyMxceOg0ivZ33bx1rrPprskzZ4LBnGrWj:04rcuJm3FYyyMxceBvvV1Lo11GrI

Malware Config

Targets

    • Target

      я его боюсь этого пидораса ебаного.mp4

    • Size

      513KB

    • MD5

      1d5a3ef77c864d185322f524d1939463

    • SHA1

      52df87b92e3340a97beb4bb4e2916981b32d01a9

    • SHA256

      25cdf658c6e625b0056a1f737dc039ab6de8e25015ca0433b593fe448d07aab3

    • SHA512

      6947c42f49113d48aea5cc5d2e919e1852234f79a6a7eacd807bb04420b85eb17d5988309aaa923afafb6ad2e7cd4fa84f719571958f058699baced987230fef

    • SSDEEP

      12288:U14S+RBfnkuJm3FYyyMxceOg0ivZ33bx1rrPprskzZ4LBnGrWj:04rcuJm3FYyyMxceBvvV1Lo11GrI

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • Bazar/Team9 Loader payload

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1947) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Network Service Discovery

2
T1046

Query Registry

3
T1012

System Information Discovery

3
T1082

Command and Control

Web Service

1
T1102

Tasks