General

  • Target

    33fe9450c17582b6968ea1a507651e77

  • Size

    1.2MB

  • Sample

    231231-neanhaefc5

  • MD5

    33fe9450c17582b6968ea1a507651e77

  • SHA1

    2cd4a530ccdae728d9278025e344e931d2dc6703

  • SHA256

    d0e608a7a0b874649fa154ed44f6d61ae4e5188121926e982bb359e3bd61e5b3

  • SHA512

    a4fdcde472a64ba56f1cf8ceeaba5d3c20e9c36c0d71c5fce910c2774667f774753047df20fea369ff431db90b239822a57b8dc824351ae8623c8ff40849af76

  • SSDEEP

    24576:0Wpc+G43nwqthqmmldpXoQ5IyXdLrgvHmrE:8+n3Hthqm9qgkE

Malware Config

Targets

    • Target

      33fe9450c17582b6968ea1a507651e77

    • Size

      1.2MB

    • MD5

      33fe9450c17582b6968ea1a507651e77

    • SHA1

      2cd4a530ccdae728d9278025e344e931d2dc6703

    • SHA256

      d0e608a7a0b874649fa154ed44f6d61ae4e5188121926e982bb359e3bd61e5b3

    • SHA512

      a4fdcde472a64ba56f1cf8ceeaba5d3c20e9c36c0d71c5fce910c2774667f774753047df20fea369ff431db90b239822a57b8dc824351ae8623c8ff40849af76

    • SSDEEP

      24576:0Wpc+G43nwqthqmmldpXoQ5IyXdLrgvHmrE:8+n3Hthqm9qgkE

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • Bazar/Team9 Loader payload

    • Blocklisted process makes network request

    • Tries to connect to .bazar domain

      Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks