Analysis
-
max time kernel
120s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
19-03-2022 12:30
Static task
static1
Behavioral task
behavioral1
Sample
73a6286e983011b7cd862c90d016ae725b8fe01ca5ac9bb55fca759795eca503.dll
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
73a6286e983011b7cd862c90d016ae725b8fe01ca5ac9bb55fca759795eca503.dll
Resource
win10v2004-20220310-en
General
-
Target
73a6286e983011b7cd862c90d016ae725b8fe01ca5ac9bb55fca759795eca503.dll
-
Size
711KB
-
MD5
da7bf1a6a981b36a4f731707e673a9b4
-
SHA1
d113a9f283f93ce264bf4abeedf109f1ccd6f9bf
-
SHA256
73a6286e983011b7cd862c90d016ae725b8fe01ca5ac9bb55fca759795eca503
-
SHA512
6bb4bb33a0acfa5055fa35178fec401b7e15a97ae5bfe2b3844b134ceac86908847107403e076e5be9c6e5d18d75f2cf30b6ff32c76a71de13fbd628e217a461
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4068-134-0x000001757CC70000-0x000001757CC9B000-memory.dmp BazarLoaderVar6