Analysis
-
max time kernel
4294182s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
16-03-2022 18:54
Static task
static1
Behavioral task
behavioral1
Sample
ed067c8f3f6db4624c4bcf2433a8bb1d423fba015216fd2a1558daef33346888.dll
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
ed067c8f3f6db4624c4bcf2433a8bb1d423fba015216fd2a1558daef33346888.dll
Resource
win10v2004-en-20220113
General
-
Target
ed067c8f3f6db4624c4bcf2433a8bb1d423fba015216fd2a1558daef33346888.dll
-
Size
711KB
-
MD5
7cdc8904ccbe02e4a55f51ca0c27a892
-
SHA1
044633ba0242828efa0560b1cc9f090b2df957e4
-
SHA256
ed067c8f3f6db4624c4bcf2433a8bb1d423fba015216fd2a1558daef33346888
-
SHA512
285fea3f1b4721adccddc4c094c667ef1dcae61a7ea6f34efc838ea7a3fa25c6a311a850e4c2ee79e7df4a9a8e49ce6ead71878e68bfaadd6df3640f67e8f9e3
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1708-54-0x0000000000190000-0x00000000001BB000-memory.dmp BazarLoaderVar6