Behavioral task
behavioral1
Sample
f4a5fe23e21b6b7d63fa2d2c96a4bc4a34b40fd40a921b237a50a5976fe16001_unpacked.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f4a5fe23e21b6b7d63fa2d2c96a4bc4a34b40fd40a921b237a50a5976fe16001_unpacked.exe
Resource
win10v2004-20220812-en
General
-
Target
f4a5fe23e21b6b7d63fa2d2c96a4bc4a34b40fd40a921b237a50a5976fe16001_unpacked
-
Size
218KB
-
MD5
fdf79b8921487469919bb95b940899e6
-
SHA1
b07039a88dabe7ac577a41a931b85e33364250c9
-
SHA256
f4a5fe23e21b6b7d63fa2d2c96a4bc4a34b40fd40a921b237a50a5976fe16001
-
SHA512
e843759ca65392ae397b461e5605efa12594895c19e8a951f5621eb9b98dd834af8d9cfa61dda1252bef2bcca898ecf5a53f5363d56284b69b6ab529dec3ac7c
-
SSDEEP
6144:GoMuDd+j6cjDqcs2WFlNAemtEMb7+Nyh7+zTtLNY5Kb+:GoMGd+j6cjDqmCntm1b7+Y0rY5x
Malware Config
Signatures
-
Bazar/Team9 Backdoor payload 1 IoCs
resource yara_rule sample BazarBackdoorVar3 -
Bazarbackdoor family
Files
-
f4a5fe23e21b6b7d63fa2d2c96a4bc4a34b40fd40a921b237a50a5976fe16001_unpacked.exe windows x64
d2df526f878ab6c20c4e812e14eb6b4d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
HeapSize
GetProcessHeap
GetTickCount
WriteConsoleW
HeapFree
FlushFileBuffers
HeapReAlloc
HeapAlloc
VirtualQuery
VirtualFree
WideCharToMultiByte
DeleteCriticalSection
SetFilePointerEx
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
SetStdHandle
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
RtlUnwindEx
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RtlPcToFileHeader
GetCurrentProcess
ExitProcess
TerminateProcess
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
GetStdHandle
WriteFile
GetACP
GetStringTypeW
GetFileType
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
CloseHandle
CreateFileW
user32
RegisterClassExA
advapi32
CryptGetUserKey
CryptReleaseContext
CryptGenKey
CryptDestroyKey
CryptAcquireContextW
oleaut32
VariantClear
VariantInit
crypt32
CertSetCertificateContextProperty
CertStrToNameA
CertCreateSelfSignCertificate
CertFreeCertificateContext
secur32
InitSecurityInterfaceA
Sections
.text Size: 157KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ