Analysis
-
max time kernel
112s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-06-2022 14:18
Static task
static1
Behavioral task
behavioral1
Sample
2ecb7f64c75053239e5ded8ad8485c2dc8893b145822271d6902a7948d70aa4b.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2ecb7f64c75053239e5ded8ad8485c2dc8893b145822271d6902a7948d70aa4b.dll
Resource
win10v2004-20220414-en
General
-
Target
2ecb7f64c75053239e5ded8ad8485c2dc8893b145822271d6902a7948d70aa4b.dll
-
Size
710KB
-
MD5
0fd810942ae8887e6944ea662c77bdd0
-
SHA1
29e67f1842981dc2e9999fdb746400dbc7beeb4e
-
SHA256
2ecb7f64c75053239e5ded8ad8485c2dc8893b145822271d6902a7948d70aa4b
-
SHA512
71156aa6cd806c0356da16e0e8847959c9494e8af5485af16de7f0c37ba106b84ca7915fb7454167a34a7e7fae25b4bc4c53779c65ab72b270d011416718be35
Malware Config
Extracted
bazarloader
reddew28c.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1684-130-0x00000238F93F0000-0x00000238F941B000-memory.dmp BazarLoaderVar6 behavioral2/memory/1684-131-0x00000238F93F0000-0x00000238F941B000-memory.dmp BazarLoaderVar6