MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 071a87110c15bb64af2e6d976ed4da8429c3fee4c8872b82475746ea0b26351f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 071a87110c15bb64af2e6d976ed4da8429c3fee4c8872b82475746ea0b26351f
SHA3-384 hash: 42676f2f266f73a8768c28755f267e37c189b1dff05b27b556741fb13981769178620f122f26346bc9e1126c85c5f3cd
SHA1 hash: d8f49f02b7cba9848d8b46de2476f83c609a9045
MD5 hash: 6f45995d2e0ac7758779ae9539016d6b
humanhash: fourteen-november-black-robin
File name:071a87110c15bb64af2e6d976ed4da8429c3fee4c8872b82475746ea0b26351f
Download: download sample
Signature BazaLoader
File size:2'190'720 bytes
First seen:2020-10-07 05:22:42 UTC
Last seen:2020-10-07 06:24:42 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 629b223b09d6bd80c61ae5f379165830 (2 x BazaLoader)
ssdeep 49152:nPrAbh8WlDRSkWhb05G8w3Ug6s+6Y99yTcGT2H:nP88WlDRSkWhj3UhQY99yTcGT2H
Threatray 113 similar samples on MalwareBazaar
TLSH 14A509837AC74EA6DAC62BB4D5D343307334FD55CE6AAF2F6A08D13119536C1AD86B80
Reporter JAMESWT_WT
Tags:BazaLoader GLOBAL PARK HORIZON SP Z O O signed

Code Signing Certificate

Organisation:GLOBAL PARK HORIZON SP Z O O
Issuer:DigiCert EV Code Signing CA (SHA2)
Algorithm:sha256WithRSAEncryption
Valid from:2020-10-06T00:00:00Z
Valid to:2021-09-29T12:00:00Z
Serial number: 020bc03538fbdc792f39d99a24a81b97
Intelligence: 3 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 7be873221b11cf9ab55c537413fe3e7961d94d4638cd2efbc8a7610123da1ef3
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
125
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending a custom TCP request
Launching the default Windows debugger (dwwin.exe)
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw.evad.spre.troj
Score:
84 / 100
Signature
Allocates memory in foreign processes
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking mutex)
Hijacks the control flow in another process
Injects a PE file into a foreign processes
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Performs a network lookup / discovery via net view
Sample uses process hollowing technique
Writes to foreign memory regions
Yara detected Keylogger Generic
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 293983 Sample: Doc-Report6.10.20.exe Startdate: 06/10/2020 Architecture: WINDOWS Score: 84 44 May check the online IP address of the machine 2->44 46 Performs a network lookup / discovery via net view 2->46 48 Yara detected Keylogger Generic 2->48 8 Doc-Report6.10.20.exe 29 2->8         started        process3 dnsIp4 38 z57gc.com 34.230.74.154, 443, 49744, 49745 AMAZON-AESUS United States 8->38 50 Found evasive API chain (may stop execution after checking mutex) 8->50 52 Hijacks the control flow in another process 8->52 54 Found API chain indicative of debugger detection 8->54 56 5 other signatures 8->56 12 cmd.exe 17 8->12         started        signatures5 process6 dnsIp7 40 myexternalip.com 216.239.32.21, 443, 49810 GOOGLEUS United States 12->40 42 z55gc.com 54.236.253.121, 443, 49747, 49749 AMAZON-AESUS United States 12->42 58 Performs a network lookup / discovery via net view 12->58 16 net.exe 1 12->16         started        18 net.exe 1 12->18         started        20 net.exe 1 12->20         started        22 2 other processes 12->22 signatures8 process9 process10 24 conhost.exe 16->24         started        26 net1.exe 1 16->26         started        28 conhost.exe 18->28         started        30 net1.exe 1 18->30         started        32 conhost.exe 20->32         started        34 conhost.exe 22->34         started        36 conhost.exe 22->36         started       
Threat name:
Win64.Trojan.TrickBot
Status:
Malicious
First seen:
2020-10-06 16:35:14 UTC
File Type:
PE+ (Exe)
Extracted files:
2
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
bazarbackdoor
Score:
  10/10
Tags:
backdoor family:bazarbackdoor
Behaviour
Modifies system certificate store
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Blacklisted process makes network request
BazarBackdoor
Unpacked files
SH256 hash:
071a87110c15bb64af2e6d976ed4da8429c3fee4c8872b82475746ea0b26351f
MD5 hash:
6f45995d2e0ac7758779ae9539016d6b
SHA1 hash:
d8f49f02b7cba9848d8b46de2476f83c609a9045
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Cobalt_functions
Author:@j0sm1
Description:Detect functions coded with ROR edi,D; Detect CobaltStrike used by differents groups APT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments