Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
11-04-2022 02:39
Static task
static1
Behavioral task
behavioral1
Sample
812fff0f66fe7d06c2af1398458210b4079765752443b11dd3494d3c3c299544.dll
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
812fff0f66fe7d06c2af1398458210b4079765752443b11dd3494d3c3c299544.dll
Resource
win10v2004-20220331-en
General
-
Target
812fff0f66fe7d06c2af1398458210b4079765752443b11dd3494d3c3c299544.dll
-
Size
711KB
-
MD5
5c940b10f675bdc090ded93532cc09a5
-
SHA1
6c8ddb667ad5cd1c36c0ba0376e27de12750752e
-
SHA256
812fff0f66fe7d06c2af1398458210b4079765752443b11dd3494d3c3c299544
-
SHA512
85b6853567092a7fa623e363792819668d8cfbc08dd79fd16f119bbcfdbb203e32efdbb964170d292631cd5c903074b591c38915e3107fe51c5b8a553625d821
Malware Config
Extracted
bazarloader
reddew28c.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1652-54-0x0000000000110000-0x000000000013B000-memory.dmp BazarLoaderVar6
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1652-54-0x0000000000110000-0x000000000013B000-memory.dmpFilesize
172KB