Analysis
-
max time kernel
60s -
max time network
181s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:58
Static task
static1
Behavioral task
behavioral1
Sample
38e91adac9a33b3ebb6a0fc54c4f893b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
38e91adac9a33b3ebb6a0fc54c4f893b.dll
Resource
win10v2004-20231215-en
General
-
Target
38e91adac9a33b3ebb6a0fc54c4f893b.dll
-
Size
476KB
-
MD5
38e91adac9a33b3ebb6a0fc54c4f893b
-
SHA1
62265ccd164a4606a8447ad79e04bdae2ba2c318
-
SHA256
1e093803d9fa80bbf214b426b573a2114d2a2a931fe58eb39256e5d0461de849
-
SHA512
740af3f6c290bd6af90443de69e4edbcaa8d7050ddafcaa197f2c90c152786429da82a8143b40da2dfb2a0ae7beb6590865c115dcc3d19ed53e311405331811b
-
SSDEEP
12288:0FFMfdUxknJ9H+EVCevvH06JBXTFb5KFYOSXM65LsnUFMJnanMnY:20Ego6JPlzz
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2660-0-0x0000000001DD0000-0x0000000001FD5000-memory.dmp BazarLoaderVar5 -
Tries to connect to .bazar domain 10 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
Processes:
flow ioc 23 yellowdownpour81.bazar 10 whitestorm9p.bazar 19 bluecloud21c.bazar 21 bluecloud21c.bazar 22 bluecloud21c.bazar 20 bluecloud21c.bazar 15 bluecloud21c.bazar 16 bluecloud21c.bazar 17 bluecloud21c.bazar 18 bluecloud21c.bazar -
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 185.84.81.194 Destination IP 217.160.188.24 Destination IP 134.195.4.2 Destination IP 198.50.135.212 Destination IP 78.31.67.99 Destination IP 134.195.4.2 Destination IP 134.195.4.2 Destination IP 51.89.88.77 Destination IP 194.36.144.87 Destination IP 217.160.188.24