MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3b04e7f31c8ec3bd466ce5910277f241a6b3e7bf9d70a5fd41d7922601cc06ba. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 3b04e7f31c8ec3bd466ce5910277f241a6b3e7bf9d70a5fd41d7922601cc06ba
SHA3-384 hash: cac77cd634192c069aa0c3f4eda2774d62155c46c7280997c1d882344bd120dc0940bc128a0fada2bd2129ec3e5e6019
SHA1 hash: 9ee199674aee9af42dfff4ca68fc7082c2cff69b
MD5 hash: a25453ffec9582f897358af9323d6f02
humanhash: sink-neptune-wisconsin-georgia
File name:Report-Review20-10.exe
Download: download sample
Signature BazaLoader
File size:15'906'456 bytes
First seen:2020-10-20 18:14:25 UTC
Last seen:2020-10-20 18:59:36 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d3a2afb703bdefc4273681ac10f9f607 (9 x BazaLoader)
ssdeep 393216:NkUqt/8vHxlVvNJbYmb126bbQlv7gSREXQL+e5sOF:i0RlXJ0mb3Q2XA
Threatray 89 similar samples on MalwareBazaar
TLSH 6BF6BE4277D68909E0A61730DDB382B81677BD519D35870F328CBA1EAFF36815C66B23
Reporter BFcerdo
Tags:BazaLoader NOSOV SP Z O O signed

Intelligence


File Origin
# of uploads :
2
# of downloads :
105
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Transferring files using the Background Intelligent Transfer Service (BITS)
DNS request
Launching cmd.exe command interpreter
Sending a TCP request to an infection source
Unauthorized injection to a system process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
72 / 100
Signature
Allocates memory in foreign processes
Hijacks the control flow in another process
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Sample uses process hollowing technique
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Bazaloader
Status:
Malicious
First seen:
2020-10-20 18:16:07 UTC
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Result
Malware family:
bazarbackdoor
Score:
  10/10
Tags:
backdoor family:bazarbackdoor
Behaviour
Modifies system certificate store
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Blacklisted process makes network request
BazarBackdoor
Unpacked files
SH256 hash:
3b04e7f31c8ec3bd466ce5910277f241a6b3e7bf9d70a5fd41d7922601cc06ba
MD5 hash:
a25453ffec9582f897358af9323d6f02
SHA1 hash:
9ee199674aee9af42dfff4ca68fc7082c2cff69b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments