Static task
static1
Behavioral task
behavioral1
Sample
5974d938bc3bbfc69f68c979a6dc9c412970fc527500735385c33377ab30373a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5974d938bc3bbfc69f68c979a6dc9c412970fc527500735385c33377ab30373a.exe
Resource
win10v2004-en-20220112
General
-
Target
5974d938bc3bbfc69f68c979a6dc9c412970fc527500735385c33377ab30373a
-
Size
218KB
-
MD5
c35cef0d8f236d510676004d41a7283f
-
SHA1
e67f6dd0b68b023fcc9e7dd380daa451ce9a1a18
-
SHA256
5974d938bc3bbfc69f68c979a6dc9c412970fc527500735385c33377ab30373a
-
SHA512
078acbdcd38666f686a2fa526d806d5f671f1a1cb6e52ef615f634ad74e8fceb856164d1f166889d47e08ef9738403b90be0e610321944a507895073abbc1f26
-
SSDEEP
6144:fAae6VkU5vGSPOpU2FgSnFAedymPV7M5y7W5o/7q6jsDeU:fAwVkU5vjPOzSSFtdDPVMAq6js
Malware Config
Signatures
-
Bazar/Team9 Backdoor payload 1 IoCs
Processes:
resource yara_rule sample BazarBackdoorVar3 -
Bazarbackdoor family
Files
-
5974d938bc3bbfc69f68c979a6dc9c412970fc527500735385c33377ab30373a.exe windows x64
d2df526f878ab6c20c4e812e14eb6b4d
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
HeapSize
GetProcessHeap
GetTickCount
WriteConsoleW
HeapFree
FlushFileBuffers
HeapReAlloc
HeapAlloc
VirtualQuery
VirtualFree
WideCharToMultiByte
DeleteCriticalSection
SetFilePointerEx
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
SetStdHandle
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
RtlUnwindEx
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RtlPcToFileHeader
GetCurrentProcess
ExitProcess
TerminateProcess
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
GetStdHandle
WriteFile
GetACP
GetStringTypeW
GetFileType
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
CloseHandle
CreateFileW
user32
RegisterClassExA
advapi32
CryptGetUserKey
CryptReleaseContext
CryptGenKey
CryptDestroyKey
CryptAcquireContextW
oleaut32
VariantClear
VariantInit
crypt32
CertSetCertificateContextProperty
CertStrToNameA
CertCreateSelfSignCertificate
CertFreeCertificateContext
secur32
InitSecurityInterfaceA
Sections
.text Size: 157KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ