Analysis
-
max time kernel
4294182s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
16-03-2022 14:21
Static task
static1
Behavioral task
behavioral1
Sample
d3e07f7741429a282c0fb4b181e7a0695f42752c7934178b08677ca7e48d188a.dll
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
d3e07f7741429a282c0fb4b181e7a0695f42752c7934178b08677ca7e48d188a.dll
Resource
win10v2004-en-20220113
General
-
Target
d3e07f7741429a282c0fb4b181e7a0695f42752c7934178b08677ca7e48d188a.dll
-
Size
711KB
-
MD5
a0aeae7850c93edae03f92ba20e16b4c
-
SHA1
0efe6513bc1eacd214935c7f8525e63f81e96a9a
-
SHA256
d3e07f7741429a282c0fb4b181e7a0695f42752c7934178b08677ca7e48d188a
-
SHA512
a391201c34de4dadf268314e985aaa83fe15fce175447762736cea9d6fd962d229a988a78b4f6a41ad1cce1352d65d72dcbb122a130c9424f33b32bc5dfceb9c
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1660-54-0x0000000000110000-0x000000000013B000-memory.dmp BazarLoaderVar6
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1660-54-0x0000000000110000-0x000000000013B000-memory.dmpFilesize
172KB