Analysis
-
max time kernel
124s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
18-03-2022 12:34
Static task
static1
Behavioral task
behavioral1
Sample
e7f00b140461ab22480c88a0b7f145e069867f5ff6dbc811996927e689bad530.dll
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
e7f00b140461ab22480c88a0b7f145e069867f5ff6dbc811996927e689bad530.dll
Resource
win10v2004-20220310-en
General
-
Target
e7f00b140461ab22480c88a0b7f145e069867f5ff6dbc811996927e689bad530.dll
-
Size
710KB
-
MD5
8085eab959257cd8dce631df5bde0db7
-
SHA1
ae5c27edd767d5f92b60b39c719bd5350d4be625
-
SHA256
e7f00b140461ab22480c88a0b7f145e069867f5ff6dbc811996927e689bad530
-
SHA512
6b23b66414775edf54358a9a4cee32b6b419b83a86553a47454a022a30f66d29592192f3709cecfcc338a2faa252a7d9da69fc3a40e03361e5f4c93a1cff2278
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2848-134-0x000001E717EA0000-0x000001E717ECB000-memory.dmp BazarLoaderVar6 -
BazarLoader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2848-134-0x000001E717EA0000-0x000001E717ECB000-memory.dmp BazarLoader