MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0ade5a6d2fbbec04e69053d50ca34587f413fd28ddd8ccec490b3d0196db135e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 0ade5a6d2fbbec04e69053d50ca34587f413fd28ddd8ccec490b3d0196db135e
SHA3-384 hash: 1998b437c98c63161c833bae0323e931f18b9d6c1babaa1621280dc1bc1fa7684bdd05fe42c95b07ade3334422d71d8a
SHA1 hash: cf95d2f02e187f044a6209860a2a8efb5c5ca8ca
MD5 hash: 72f052befbb4985aff1c49ac1be1d927
humanhash: november-nitrogen-blossom-low
File name:SecuriteInfo.com.Win64.BazarLoader.BE.17446.14787
Download: download sample
Signature BazaLoader
File size:462'462 bytes
First seen:2021-09-23 18:58:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6adc355f9e29dd8e213228d49ef56128 (2 x BazaLoader)
ssdeep 6144:H0H0p3AXGVKMwj1TBVjTv7yQ26XWHgO0DgumypLUa2u8ol7LHwNo5E52Kqe+B1fp:UHgwWVcj1LmQ2Hhy+a2WjwBPq3nh
Threatray 9 similar samples on MalwareBazaar
TLSH T1C3A45A4AB3A54CB5E972913989538E5AE7F2BC218B70C38F52A0675F1F337E06939311
File icon (PE):PE icon
dhash icon 71b119dcce576333 (3'570 x Heodo, 203 x TrickBot, 19 x Gh0stRAT)
Reporter SecuriteInfoCom
Tags:BazaLoader exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
128
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Win64.BazarLoader.BE.17446.14787
Verdict:
No threats detected
Analysis date:
2021-09-23 19:00:55 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Malware family:
BazarBackdoor
Verdict:
Malicious
Result
Threat name:
Bazar Loader
Detection:
malicious
Classification:
spyw.evad
Score:
88 / 100
Signature
Allocates memory in foreign processes
Detected Bazar Loader
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: CobaltStrike Load by Rundll32
Sigma detected: Suspicious Svchost Process
System process connects to network (likely due to code injection or exploit)
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 489287 Sample: SecuriteInfo.com.Win64.Baza... Startdate: 23/09/2021 Architecture: WINDOWS Score: 88 48 Detected Bazar Loader 2->48 50 Sigma detected: CobaltStrike Load by Rundll32 2->50 52 Sigma detected: Suspicious Svchost Process 2->52 8 loaddll64.exe 1 2->8         started        10 rundll32.exe 2->10         started        process3 process4 12 cmd.exe 1 8->12         started        14 iexplore.exe 1 73 8->14         started        16 rundll32.exe 8->16         started        18 9 other processes 8->18 process5 20 rundll32.exe 14 12->20         started        24 iexplore.exe 152 14->24         started        dnsIp6 30 167.172.106.204, 443, 49888 DIGITALOCEAN-ASNUS United States 20->30 32 167.172.110.154, 443, 49895 DIGITALOCEAN-ASNUS United States 20->32 38 4 other IPs or domains 20->38 54 System process connects to network (likely due to code injection or exploit) 20->54 56 Writes to foreign memory regions 20->56 58 Allocates memory in foreign processes 20->58 60 3 other signatures 20->60 26 svchost.exe 20->26         started        34 edge.gycpi.b.yahoodns.net 87.248.118.22, 443, 49821, 49822 YAHOO-DEBDE United Kingdom 24->34 36 tls13.taboola.map.fastly.net 151.101.1.44, 443, 49823, 49824 FASTLYUS United States 24->36 40 11 other IPs or domains 24->40 signatures7 process8 dnsIp9 42 www-amazon-com.customer.fastly.net 26->42 44 new-fp-shed.wg1.b.yahoo.com 87.248.100.215, 443, 49933, 49940 YAHOO-IRDGB United Kingdom 26->44 46 5 other IPs or domains 26->46 62 System process connects to network (likely due to code injection or exploit) 26->62 signatures10
Threat name:
Win64.Trojan.BazarLoader
Status:
Malicious
First seen:
2021-09-23 18:59:06 UTC
AV detection:
6 of 27 (22.22%)
Threat level:
  5/5
Result
Malware family:
bazarloader
Score:
  10/10
Tags:
family:bazarloader dropper loader
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Bazar/Team9 Loader payload
Bazar Loader
Unpacked files
SH256 hash:
0ade5a6d2fbbec04e69053d50ca34587f413fd28ddd8ccec490b3d0196db135e
MD5 hash:
72f052befbb4985aff1c49ac1be1d927
SHA1 hash:
cf95d2f02e187f044a6209860a2a8efb5c5ca8ca
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments