Analysis
-
max time kernel
4294214s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
20-03-2022 05:57
Static task
static1
Behavioral task
behavioral1
Sample
a32ed4b36d44c489341721920d27294cab78ad7bd970c8ac6baa3edc4337a600.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
a32ed4b36d44c489341721920d27294cab78ad7bd970c8ac6baa3edc4337a600.exe
Resource
win10v2004-20220310-en
General
-
Target
a32ed4b36d44c489341721920d27294cab78ad7bd970c8ac6baa3edc4337a600.exe
-
Size
576KB
-
MD5
5686d8ae3dbaf2898116583c91adf368
-
SHA1
beac049079ab19cd2e783d90634d461ab4ebf567
-
SHA256
a32ed4b36d44c489341721920d27294cab78ad7bd970c8ac6baa3edc4337a600
-
SHA512
ccef24fac9b7c4a2be0e4fa43d5187335e16e8be86051fb7f7dfc2c5dd9eb4e00a9ef8c6af9e88a4eca7b77ea859c3dd6ea495d5ed1eea407bbc26cbb49ad133
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
BazarBackdoor
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
-
Bazar/Team9 Backdoor payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/792-55-0x0000000002170000-0x00000000021C9000-memory.dmp BazarBackdoorVar3 behavioral1/memory/792-59-0x0000000180000000-0x0000000180058000-memory.dmp BazarBackdoorVar3 behavioral1/memory/792-64-0x0000000001CE0000-0x0000000001D37000-memory.dmp BazarBackdoorVar3 -
Bazar/Team9 Loader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/792-55-0x0000000002170000-0x00000000021C9000-memory.dmp BazarLoaderVar3 behavioral1/memory/792-59-0x0000000180000000-0x0000000180058000-memory.dmp BazarLoaderVar3 behavioral1/memory/792-64-0x0000000001CE0000-0x0000000001D37000-memory.dmp BazarLoaderVar3