Analysis
-
max time kernel
133s -
max time network
142s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
07/12/2021, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
resource.dll
Resource
win7-en-20211104
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
resource.dll
Resource
win10-en-20211014
0 signatures
0 seconds
General
-
Target
resource.dll
-
Size
411KB
-
MD5
e213401158fcd632f758cd8bda224c7a
-
SHA1
407852c802d47e368f8e92a14c3b107eb34ec68b
-
SHA256
4a5f37ff394af7a750b1933c3e77b927043e933bfa715c917c824fbc645c940c
-
SHA512
66e3485f72a76f51ca97a9cbcc893c25f3feffccb75de4429bf69523174c5881552bb54c95977cc9684667b756cf9fa02e3c4ed00a487b5ae177f12cf12954af
Score
10/10
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 1 IoCs
resource yara_rule behavioral1/memory/976-55-0x0000000180000000-0x0000000180033000-memory.dmp BazarLoaderVar5 -
Blocklisted process makes network request 2 IoCs
flow pid Process 4 976 rundll32.exe 5 976 rundll32.exe