Analysis
-
max time kernel
70s -
max time network
113s -
platform
windows7_x64 -
resource
win7 -
submitted
10-09-2020 08:49
Static task
static1
Behavioral task
behavioral1
Sample
e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exe
-
Size
379KB
-
MD5
9f00d78f2e8e4523773a264f85be1c02
-
SHA1
3c542144a7a03134060bd666206a106bcea95e5a
-
SHA256
e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e
-
SHA512
5760967703d0702d4c855b75c895a2432c809ca8f945f2a80914f21b3c8129c4bbf155bac4bb5fa6b03e868b3d33cfbe1b3321a7b438741cd62d1c3323d38928
Malware Config
Signatures
-
Bazar Loader 14 IoCs
Detected loader normally used to deploy BazarBackdoor malware.
Processes:
e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exedescription flow ioc Process HTTP URL 7 https://82.146.37.128/api/v154