Analysis
-
max time kernel
136s -
max time network
139s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
26-10-2021 11:33
Static task
static1
Behavioral task
behavioral1
Sample
70f35da61529c48234793cd0eeb25715ead9c3d8.dll
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
70f35da61529c48234793cd0eeb25715ead9c3d8.dll
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
70f35da61529c48234793cd0eeb25715ead9c3d8.dll
-
Size
601KB
-
MD5
398bc67b1475d56dccb8b48f53f1e467
-
SHA1
70f35da61529c48234793cd0eeb25715ead9c3d8
-
SHA256
9f433ac837309fecdd3ea85574d49350aa304d383560bb4f80654d18f64151d3
-
SHA512
6468ff6775e730d392087ec730920f8d097afa5a2400f513c4a68d5190ca15c15dd78503047478408a3de01d3b4d3186d1c7da2ea70c043d85ca76032a39ee63
Score
10/10
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1720-55-0x0000000180001000-0x000000018002E000-memory.dmp BazarLoaderVar5 -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 4 1720 rundll32.exe 6 1720 rundll32.exe