General

  • Target

    e19cd64152079ebf94ef57e14ff282f2_JaffaCakes118

  • Size

    323KB

  • Sample

    240915-dykbyatcla

  • MD5

    e19cd64152079ebf94ef57e14ff282f2

  • SHA1

    eecc0ece0b284d45561563572f82fa77e04b2b62

  • SHA256

    0f57d982ac53afb0343f77792ee0d3b03f60878969fc2bcd6d81eb941fe7e696

  • SHA512

    cb884db730b8e0b9b50fd91402575169beb589e9a60ebbc7fdd1073e1829b4131da0a6b4b41052c601943c8cb15c37d606186b43f0c583753b64dab206b6c528

  • SSDEEP

    6144:YI3KOympXst+asjCpeIFieYhUnUJSbH7rU/uWje6H9vq:YFOl9sGjY7uFmrzg9vq

Malware Config

Targets

    • Target

      e19cd64152079ebf94ef57e14ff282f2_JaffaCakes118

    • Size

      323KB

    • MD5

      e19cd64152079ebf94ef57e14ff282f2

    • SHA1

      eecc0ece0b284d45561563572f82fa77e04b2b62

    • SHA256

      0f57d982ac53afb0343f77792ee0d3b03f60878969fc2bcd6d81eb941fe7e696

    • SHA512

      cb884db730b8e0b9b50fd91402575169beb589e9a60ebbc7fdd1073e1829b4131da0a6b4b41052c601943c8cb15c37d606186b43f0c583753b64dab206b6c528

    • SSDEEP

      6144:YI3KOympXst+asjCpeIFieYhUnUJSbH7rU/uWje6H9vq:YFOl9sGjY7uFmrzg9vq

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • Bazar/Team9 Loader payload

    • Tries to connect to .bazar domain

      Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Matrix

Tasks