MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1f136522cc2cdea93e2086aa67ab07102bcef7e31b201489b43707986824b3f8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 1f136522cc2cdea93e2086aa67ab07102bcef7e31b201489b43707986824b3f8
SHA3-384 hash: 2cf7e08ce0f5ba893879e59abfb475522215fcbf6ea4943b992c381b13d5c78f6b962f2b4bdffbb9534465fc7298454f
SHA1 hash: ea43b8d17588710f01ce79c07cb7d79433d3623a
MD5 hash: 60a361ce5f18ad041ca2b1f668828219
humanhash: tennis-utah-grey-bulldog
File name:60a361ce5f18ad041ca2b1f668828219.dll
Download: download sample
Signature BazaLoader
File size:289'415 bytes
First seen:2021-10-13 17:45:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f2aa966974790b641bc88c5a5bd46a40 (2 x BazaLoader)
ssdeep 6144:VWvccklaZIIq3+Q4gdD3iD9Rd3YdFT/od3kQM:VIcZao3+Qr4zMFTwXM
Threatray 31 similar samples on MalwareBazaar
TLSH T138546DB6F2912DA6EAD1C879C216B1B4F28368373765E1D0B5A706D3102D4E4CEB6F13
Reporter abuse_ch
Tags:BazaLoader BazarBackdoor BazarLoader dll exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
292
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
60a361ce5f18ad041ca2b1f668828219.dll
Verdict:
No threats detected
Analysis date:
2021-10-13 18:12:08 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Transferring files using the Background Intelligent Transfer Service (BITS)
Launching a process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Bazar Loader
Detection:
malicious
Classification:
spre.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Detected Bazar Loader
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Performs a network lookup / discovery via net view
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Sample uses process hollowing technique
Sets debug register (to hijack the execution of another thread)
Sigma detected: Dridex Process Pattern
Sigma detected: Suspicious Svchost Process
System process connects to network (likely due to code injection or exploit)
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 502388 Sample: zq8o6y1z60.dll Startdate: 13/10/2021 Architecture: WINDOWS Score: 100 73 Multi AV Scanner detection for submitted file 2->73 75 Detected Bazar Loader 2->75 77 Sigma detected: Dridex Process Pattern 2->77 79 Sigma detected: Suspicious Svchost Process 2->79 9 loaddll64.exe 1 2->9         started        11 rundll32.exe 2->11         started        process3 process4 13 regsvr32.exe 19 9->13         started        17 iexplore.exe 1 73 9->17         started        19 cmd.exe 1 9->19         started        21 2 other processes 9->21 dnsIp5 67 161.35.66.76, 443, 49898 DIGITALOCEAN-ASNUS United States 13->67 69 www-amazon-com.customer.fastly.net 162.219.225.118, 443, 49909, 49919 ALLO-COMMUS United States 13->69 71 7 other IPs or domains 13->71 89 System process connects to network (likely due to code injection or exploit) 13->89 91 Contains functionality to inject code into remote processes 13->91 93 Sets debug register (to hijack the execution of another thread) 13->93 95 5 other signatures 13->95 23 svchost.exe 13->23         started        27 iexplore.exe 2 154 17->27         started        29 rundll32.exe 19->29         started        signatures6 process7 dnsIp8 55 www-amazon-com.customer.fastly.net 23->55 57 87.248.100.216, 443, 49949, 49959 YAHOO-IRDGB United Kingdom 23->57 63 11 other IPs or domains 23->63 81 System process connects to network (likely due to code injection or exploit) 23->81 83 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 23->83 85 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 23->85 87 Performs a network lookup / discovery via net view 23->87 31 net.exe 23->31         started        33 net.exe 23->33         started        35 net.exe 23->35         started        37 2 other processes 23->37 59 ssp.ads.betweendigital.com 88.212.252.22, 443, 49836, 49837 SERVERS-COMUS Russian Federation 27->59 61 dart.l.doubleclick.net 142.250.185.70, 443, 49855, 49856 GOOGLEUS United States 27->61 65 25 other IPs or domains 27->65 signatures9 process10 process11 39 conhost.exe 31->39         started        41 net1.exe 31->41         started        43 conhost.exe 33->43         started        45 net1.exe 33->45         started        47 conhost.exe 35->47         started        49 net1.exe 35->49         started        51 conhost.exe 37->51         started        53 conhost.exe 37->53         started       
Result
Malware family:
bazarloader
Score:
  10/10
Tags:
family:bazarloader dropper loader
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Bazar/Team9 Loader payload
Bazar Loader
Unpacked files
SH256 hash:
1f136522cc2cdea93e2086aa67ab07102bcef7e31b201489b43707986824b3f8
MD5 hash:
60a361ce5f18ad041ca2b1f668828219
SHA1 hash:
ea43b8d17588710f01ce79c07cb7d79433d3623a
Malware family:
BazarLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

BazaLoader

Executable exe 1f136522cc2cdea93e2086aa67ab07102bcef7e31b201489b43707986824b3f8

(this sample)

  
Delivery method
Distributed via web download

Comments