General

  • Target

    3883bba6d366e73e63226f1e842b44e5

  • Size

    429KB

  • Sample

    231231-q16deaeghp

  • MD5

    3883bba6d366e73e63226f1e842b44e5

  • SHA1

    869e3dafe24ed7e764d489dd38048fee4ad91090

  • SHA256

    4e4c7f6c2c9c7b4d73b73b38132dc9972c7d1492d628fe5d4ffb9b105ac84799

  • SHA512

    f51f0bb734d389bbf3868ac5208cb582795977a961ad6b021dd11933090eafa1f47d0cb9e4b862859f4c2fd7772806bdf336aaebc95d49286f17b33db37c3423

  • SSDEEP

    12288:dCQXHfmzl5O43PLKOWVaLuox94QsbcG0CZgL:lOrO2PLKlVFox94QswTCeL

Malware Config

Targets

    • Target

      3883bba6d366e73e63226f1e842b44e5

    • Size

      429KB

    • MD5

      3883bba6d366e73e63226f1e842b44e5

    • SHA1

      869e3dafe24ed7e764d489dd38048fee4ad91090

    • SHA256

      4e4c7f6c2c9c7b4d73b73b38132dc9972c7d1492d628fe5d4ffb9b105ac84799

    • SHA512

      f51f0bb734d389bbf3868ac5208cb582795977a961ad6b021dd11933090eafa1f47d0cb9e4b862859f4c2fd7772806bdf336aaebc95d49286f17b33db37c3423

    • SSDEEP

      12288:dCQXHfmzl5O43PLKOWVaLuox94QsbcG0CZgL:lOrO2PLKlVFox94QswTCeL

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • Bazar/Team9 Loader payload

    • Tries to connect to .bazar domain

      Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks