Analysis
-
max time kernel
151s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
16-03-2022 14:21
Static task
static1
Behavioral task
behavioral1
Sample
d3e07f7741429a282c0fb4b181e7a0695f42752c7934178b08677ca7e48d188a.dll
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
d3e07f7741429a282c0fb4b181e7a0695f42752c7934178b08677ca7e48d188a.dll
Resource
win10v2004-en-20220113
General
-
Target
d3e07f7741429a282c0fb4b181e7a0695f42752c7934178b08677ca7e48d188a.dll
-
Size
711KB
-
MD5
a0aeae7850c93edae03f92ba20e16b4c
-
SHA1
0efe6513bc1eacd214935c7f8525e63f81e96a9a
-
SHA256
d3e07f7741429a282c0fb4b181e7a0695f42752c7934178b08677ca7e48d188a
-
SHA512
a391201c34de4dadf268314e985aaa83fe15fce175447762736cea9d6fd962d229a988a78b4f6a41ad1cce1352d65d72dcbb122a130c9424f33b32bc5dfceb9c
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3628-130-0x000002928E9C0000-0x000002928E9EB000-memory.dmp BazarLoaderVar6