General

  • Target

    2331fa420bee83df1248af48853a6f7748923cdae906b58c43ef8e11c6c72ca9.exe

  • Size

    536KB

  • Sample

    241121-kbhm6azphx

  • MD5

    fe8a0ef0c5c1d5d8dd2517abb69dcdf5

  • SHA1

    a75acad19f4be69b0b6870f14e413bb4de06ec73

  • SHA256

    2331fa420bee83df1248af48853a6f7748923cdae906b58c43ef8e11c6c72ca9

  • SHA512

    a3b046e9f79692e1e9992cfb319820c5be6b44e9478ecd3c5c83c37bdcb0354216a674132e7c75e87998a91d250ae08f7362ee8877144aa1d4b04dda6ba2d775

  • SSDEEP

    12288:Zyt/7qSH5Z/zY5wkzg+28UkWotGIDODuIPTr0:ZS/v5iwkzA8UkWMGWOdr0

Malware Config

Targets

    • Target

      2331fa420bee83df1248af48853a6f7748923cdae906b58c43ef8e11c6c72ca9.exe

    • Size

      536KB

    • MD5

      fe8a0ef0c5c1d5d8dd2517abb69dcdf5

    • SHA1

      a75acad19f4be69b0b6870f14e413bb4de06ec73

    • SHA256

      2331fa420bee83df1248af48853a6f7748923cdae906b58c43ef8e11c6c72ca9

    • SHA512

      a3b046e9f79692e1e9992cfb319820c5be6b44e9478ecd3c5c83c37bdcb0354216a674132e7c75e87998a91d250ae08f7362ee8877144aa1d4b04dda6ba2d775

    • SSDEEP

      12288:Zyt/7qSH5Z/zY5wkzg+28UkWotGIDODuIPTr0:ZS/v5iwkzA8UkWMGWOdr0

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • Bazarloader family

    • Bazar/Team9 Loader payload

    • Blocklisted process makes network request

    • Tries to connect to .bazar domain

      Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Matrix

Tasks