Behavioral task
behavioral1
Sample
8236b4c91e12dee425e93a74b122156e603c15001831bd15d5d3f8d4b895baa3.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8236b4c91e12dee425e93a74b122156e603c15001831bd15d5d3f8d4b895baa3.exe
Resource
win10v2004-20250314-en
General
-
Target
8236b4c91e12dee425e93a74b122156e603c15001831bd15d5d3f8d4b895baa3.exe
-
Size
225KB
-
MD5
03e699324d06bd3d597994f5df893048
-
SHA1
d8a343356f2769ef737b074910471436db3225be
-
SHA256
8236b4c91e12dee425e93a74b122156e603c15001831bd15d5d3f8d4b895baa3
-
SHA512
762f197443dca4497a31c8940788bc80f3a469d1d9b0364eeed9a40ed6d9df8688d635103eec73d863329877c053291adbfe8d7ba05c57360b7d17128baff069
-
SSDEEP
6144:v8owshbwCQtOaMdkO1U2+N6FCYv69BollAEY+D8:E3s9wCQt4dkOfu6Ftv6UzhY+g
Malware Config
Signatures
-
Bazar/Team9 Backdoor payload 1 IoCs
resource yara_rule sample BazarBackdoorVar4 -
Bazarbackdoor family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8236b4c91e12dee425e93a74b122156e603c15001831bd15d5d3f8d4b895baa3.exe
Files
-
8236b4c91e12dee425e93a74b122156e603c15001831bd15d5d3f8d4b895baa3.exe.exe windows:5 windows x64 arch:x64
5f491fc95717cb3cb71c8cafd2647f93
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetTickCount
WriteConsoleW
SetFilePointerEx
GetProcessHeap
FlushFileBuffers
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetConsoleMode
SetStdHandle
GetLastError
RaiseException
GetConsoleCP
lstrcmpA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
RtlUnwindEx
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RtlPcToFileHeader
GetCurrentProcess
ExitProcess
TerminateProcess
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
WriteFile
GetACP
GetStringTypeW
GetFileType
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
CloseHandle
CreateFileW
user32
SetTimer
advapi32
CryptGetUserKey
CryptReleaseContext
CryptGenKey
CryptDestroyKey
CryptAcquireContextW
oleaut32
VariantInit
VariantChangeType
VariantClear
crypt32
CertSetCertificateContextProperty
CertStrToNameA
CertCreateSelfSignCertificate
CertFreeCertificateContext
secur32
InitSecurityInterfaceA
Sections
.text Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ