MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cc1c6834480497598c17952b72e93f4b71ce4670f33558857e7ca87b55135013. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: cc1c6834480497598c17952b72e93f4b71ce4670f33558857e7ca87b55135013
SHA3-384 hash: 31e24e9e4fef3c18e91d7aefd22ae14e3d7e5fbf3d3faf1f4ea822c643075349c0869181171d365fdcc780eeee3e709d
SHA1 hash: 8257c05e69578b98791b277a8668532f3715443a
MD5 hash: 54d45a2e306b21ed279e6b44474d3fda
humanhash: autumn-skylark-montana-steak
File name:1 (12)
Download: download sample
Signature BazaLoader
File size:5'221'584 bytes
First seen:2020-10-14 05:49:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ad554eca2dccab19fa8f0e91962088ee (7 x BazaLoader)
ssdeep 24576:6SdSibLI5H+5xSzDGwzn/xl43hwxJr9lrOluk6ME4qsnJjTwB2N+zuIlCrcpc9Tt:6ibLI5H+SGwrc3q8mPS1n72OZ00l
Threatray 134 similar samples on MalwareBazaar
TLSH A83618CAB3E1ADCFD09AD7739EE687301711E81006174B8B63989F2CBA5AB445F45F21
Reporter JAMESWT_WT
Tags:BazaLoader SNAB-RESURS OOO

Code Signing Certificate

Organisation:DigiCert High Assurance EV Root CA
Issuer:DigiCert High Assurance EV Root CA
Algorithm:sha1WithRSAEncryption
Valid from:Nov 10 00:00:00 2006 GMT
Valid to:Nov 10 00:00:00 2031 GMT
Serial number: 02AC5C266A0B409B8F0B79F2AE462577
Intelligence: 204 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 7431E5F4C3C1CE4690774F0B61E05440883BA9A01ED00BA6ABD7806ED3B118CF
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
115
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Transferring files using the Background Intelligent Transfer Service (BITS)
DNS request
Sending a custom TCP request
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw.evad
Score:
76 / 100
Signature
Allocates memory in foreign processes
Hijacks the control flow in another process
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Writes to foreign memory regions
Yara detected Keylogger Generic
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.BazarLoader
Status:
Malicious
First seen:
2020-10-14 05:30:28 UTC
File Type:
PE+ (Exe)
Extracted files:
8
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
bazarbackdoor
Score:
  10/10
Tags:
backdoor family:bazarbackdoor
Behaviour
Modifies system certificate store
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Blacklisted process makes network request
BazarBackdoor
Unpacked files
SH256 hash:
cc1c6834480497598c17952b72e93f4b71ce4670f33558857e7ca87b55135013
MD5 hash:
54d45a2e306b21ed279e6b44474d3fda
SHA1 hash:
8257c05e69578b98791b277a8668532f3715443a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments