General

  • Target

    d7b8b4a606c8b2dfebfb882afa35bca7

  • Size

    1.2MB

  • Sample

    240320-dj676afd42

  • MD5

    d7b8b4a606c8b2dfebfb882afa35bca7

  • SHA1

    e276135a072675aa65b37a0cfd576e1f3637604e

  • SHA256

    bd1182eb3595956ac524dc8d13e1df4bc1d9a0f8e7f2e14d2331bb26750d1df9

  • SHA512

    d0f3b5e8a8ab94c808929cfefdf33e5ba5e39f587a96ed5222222b618e2a1ed2b52e20ad3b49d0dc845f24800815572ddbe4df7ba4172c962625835136ed6960

  • SSDEEP

    24576:rHvFVj8+YADTpPIeVCMaKoUo5/IyXZHa/L:/Y+YuTpPVPBwW

Malware Config

Targets

    • Target

      d7b8b4a606c8b2dfebfb882afa35bca7

    • Size

      1.2MB

    • MD5

      d7b8b4a606c8b2dfebfb882afa35bca7

    • SHA1

      e276135a072675aa65b37a0cfd576e1f3637604e

    • SHA256

      bd1182eb3595956ac524dc8d13e1df4bc1d9a0f8e7f2e14d2331bb26750d1df9

    • SHA512

      d0f3b5e8a8ab94c808929cfefdf33e5ba5e39f587a96ed5222222b618e2a1ed2b52e20ad3b49d0dc845f24800815572ddbe4df7ba4172c962625835136ed6960

    • SSDEEP

      24576:rHvFVj8+YADTpPIeVCMaKoUo5/IyXZHa/L:/Y+YuTpPVPBwW

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • Bazar/Team9 Loader payload

    • Tries to connect to .bazar domain

      Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks