General
-
Target
33fe9450c17582b6968ea1a507651e77
-
Size
1.2MB
-
Sample
231231-neanhaefc5
-
MD5
33fe9450c17582b6968ea1a507651e77
-
SHA1
2cd4a530ccdae728d9278025e344e931d2dc6703
-
SHA256
d0e608a7a0b874649fa154ed44f6d61ae4e5188121926e982bb359e3bd61e5b3
-
SHA512
a4fdcde472a64ba56f1cf8ceeaba5d3c20e9c36c0d71c5fce910c2774667f774753047df20fea369ff431db90b239822a57b8dc824351ae8623c8ff40849af76
-
SSDEEP
24576:0Wpc+G43nwqthqmmldpXoQ5IyXdLrgvHmrE:8+n3Hthqm9qgkE
Static task
static1
Behavioral task
behavioral1
Sample
33fe9450c17582b6968ea1a507651e77.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
33fe9450c17582b6968ea1a507651e77.dll
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
33fe9450c17582b6968ea1a507651e77
-
Size
1.2MB
-
MD5
33fe9450c17582b6968ea1a507651e77
-
SHA1
2cd4a530ccdae728d9278025e344e931d2dc6703
-
SHA256
d0e608a7a0b874649fa154ed44f6d61ae4e5188121926e982bb359e3bd61e5b3
-
SHA512
a4fdcde472a64ba56f1cf8ceeaba5d3c20e9c36c0d71c5fce910c2774667f774753047df20fea369ff431db90b239822a57b8dc824351ae8623c8ff40849af76
-
SSDEEP
24576:0Wpc+G43nwqthqmmldpXoQ5IyXdLrgvHmrE:8+n3Hthqm9qgkE
Score10/10-
Bazar/Team9 Loader payload
-
Blocklisted process makes network request
-
Tries to connect to .bazar domain
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-