Analysis
-
max time kernel
4294185s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
30-03-2022 07:14
Static task
static1
Behavioral task
behavioral1
Sample
cd8c6dcf792f0677ca7c8f821c88b6938c38f709c096096ff1babfa504b39cf0.dll
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
cd8c6dcf792f0677ca7c8f821c88b6938c38f709c096096ff1babfa504b39cf0.dll
Resource
win10v2004-20220310-en
General
-
Target
cd8c6dcf792f0677ca7c8f821c88b6938c38f709c096096ff1babfa504b39cf0.dll
-
Size
711KB
-
MD5
fa51cc2f2325505d225cea202e2ea405
-
SHA1
f27f9ee5ad9b48dbcfe5750d2b304eda0ff72024
-
SHA256
cd8c6dcf792f0677ca7c8f821c88b6938c38f709c096096ff1babfa504b39cf0
-
SHA512
9abe97ff4723d07a7a8bc15ed22840f7a358ba74d855822c3b34b28a3987a5ca163a623742ef5fccdfb2dba109c2a4edee74830fa3e8dcca3a0218dd2b0becae
Malware Config
Extracted
bazarloader
reddew28c.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1776-54-0x0000000001AE0000-0x0000000001B0B000-memory.dmp BazarLoaderVar6
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1776-54-0x0000000001AE0000-0x0000000001B0B000-memory.dmpFilesize
172KB