MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1298c6133f76de5491828ab2eac13325c21249a1329c971f6b60e7ed85827280. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 1298c6133f76de5491828ab2eac13325c21249a1329c971f6b60e7ed85827280
SHA3-384 hash: fa010b0470fcd08375651489db8c97ecd58724dffcd842cebe681736e96b2580ab8291933232518538f3db5411170aac
SHA1 hash: 32db8cba17b8f7d902f4cc92c7b096456f018547
MD5 hash: 88ab72a8230256e35d76b544cb2c830e
humanhash: nineteen-black-california-white
File name:88ab72a8230256e35d76b544cb2c830e.dll
Download: download sample
Signature BazaLoader
File size:548'864 bytes
First seen:2021-10-12 10:13:03 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bb371708c55cf92a872421fa64c41b03 (3 x BazaLoader, 1 x IcedID)
ssdeep 12288:zJEA6MkVzE+5t6JGbmXSaotHTf8wfcZLKna:zyI6Z6JGbmXSaMHL8yc8na
Threatray 32 similar samples on MalwareBazaar
TLSH T19CC48D1AFAA408A5E176D13C89339546E6727C4E1B71CBDF2398426E1F37FD0893A721
Reporter abuse_ch
Tags:BazaLoader dll exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
174
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
88ab72a8230256e35d76b544cb2c830e.dll
Verdict:
No threats detected
Analysis date:
2021-10-12 10:36:45 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
67%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Bazar Loader
Detection:
malicious
Classification:
spyw.evad
Score:
76 / 100
Signature
Allocates memory in foreign processes
Detected Bazar Loader
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 501014 Sample: 3P7s9CZnZD.dll Startdate: 12/10/2021 Architecture: WINDOWS Score: 76 28 Detected Bazar Loader 2->28 30 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->30 7 loaddll64.exe 1 2->7         started        process3 process4 9 rundll32.exe 13 7->9         started        13 cmd.exe 1 7->13         started        15 rundll32.exe 7->15         started        17 6 other processes 7->17 dnsIp5 26 164.90.229.209, 443, 49697 DIGITALOCEAN-ASNUS United States 9->26 32 System process connects to network (likely due to code injection or exploit) 9->32 34 Writes to foreign memory regions 9->34 36 Allocates memory in foreign processes 9->36 38 2 other signatures 9->38 19 chrome.exe 13 9->19         started        22 rundll32.exe 13->22         started        signatures6 process7 dnsIp8 24 167.99.242.155, 443, 49863, 49865 DIGITALOCEAN-ASNUS United States 19->24
Threat name:
Win64.Backdoor.CobaltStrike
Status:
Malicious
First seen:
2021-10-12 10:14:05 UTC
AV detection:
14 of 28 (50.00%)
Threat level:
  5/5
Result
Malware family:
bazarloader
Score:
  10/10
Tags:
family:bazarloader dropper loader
Behaviour
Blocklisted process makes network request
Tries to connect to .bazar domain
Bazar/Team9 Loader payload
Bazar Loader
Unpacked files
SH256 hash:
1298c6133f76de5491828ab2eac13325c21249a1329c971f6b60e7ed85827280
MD5 hash:
88ab72a8230256e35d76b544cb2c830e
SHA1 hash:
32db8cba17b8f7d902f4cc92c7b096456f018547
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments