Analysis
-
max time kernel
4294180s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
26-03-2022 16:00
Static task
static1
Behavioral task
behavioral1
Sample
7360c8f6e793102af78c5cf61ee1ba88.dll
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
7360c8f6e793102af78c5cf61ee1ba88.dll
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
7360c8f6e793102af78c5cf61ee1ba88.dll
-
Size
710KB
-
MD5
7360c8f6e793102af78c5cf61ee1ba88
-
SHA1
7b11c644fda96169c1b1ca91334f94b29b0957eb
-
SHA256
dc933feffac8aabc920c5c80e3c3d76625c07281f8101d65240c693ff8658e20
-
SHA512
b6ae922e2fd9baf7e540f9c86b43e2be49a3133543b3b0e01fae34174c1efc5945c7324a1eaabd60d1c568642def0626678b6dd821c5a5bee179cb63f2f8a420
Score
10/10
Malware Config
Extracted
Family
bazarloader
C2
reddew28c.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1636-54-0x0000000000110000-0x000000000013B000-memory.dmp BazarLoaderVar6
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1636-54-0x0000000000110000-0x000000000013B000-memory.dmpFilesize
172KB