Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 03:52
Static task
static1
Behavioral task
behavioral1
Sample
896e69eb671cd7b214b433ba62902d4b04f77e935137a73e4865eb2801915210.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
896e69eb671cd7b214b433ba62902d4b04f77e935137a73e4865eb2801915210.dll
Resource
win10v2004-20241007-en
General
-
Target
896e69eb671cd7b214b433ba62902d4b04f77e935137a73e4865eb2801915210.dll
-
Size
840KB
-
MD5
b286afa6776b2a06f2b07b97a538e5b0
-
SHA1
fe78dc6c483e4c80fcbaf6facf58690ce91d64bf
-
SHA256
896e69eb671cd7b214b433ba62902d4b04f77e935137a73e4865eb2801915210
-
SHA512
a42dfe85851b3cea8b14db9e8bb370b74080d9701d76396fe9e31adac0ffd150879293a814ac2661fe280574913395e1edfab133fd6dbc41b33caf6dda003f20
-
SSDEEP
12288:Y0DgYq89aJyKXwAmliposlBT0sVxVTrU7RnVhGqYtZsUSdEPGw:Y0DgRiUAzFsD35TrU7RnzS3sUcw
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazarloader family
-
Bazar/Team9 Loader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2260-2-0x0000000180000000-0x0000000180034000-memory.dmp BazarLoaderVar5 behavioral1/memory/2260-3-0x0000000180000000-0x0000000180034000-memory.dmp BazarLoaderVar5 behavioral1/memory/2260-4-0x0000000180000000-0x0000000180034000-memory.dmp BazarLoaderVar5