MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3e647b84b510487b420bc6eac4cdd8dd246ead5632086b00ff3ccbbaff5efdd9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 3e647b84b510487b420bc6eac4cdd8dd246ead5632086b00ff3ccbbaff5efdd9
SHA3-384 hash: da03d5c26902e4e8964a55b90609390715b6c4865df3588e806bd91ef4ecdef6c2b9a43a7672df1821fe3ae2bd0fc821
SHA1 hash: 83501a19f40a88f8f4ac3d331b746a3d4c2fcd63
MD5 hash: 807d6647ee5522b39fbb3a11661da03b
humanhash: diet-jersey-timing-earth
File name:Report-Review20-10.exe
Download: download sample
Signature BazaLoader
File size:15'906'456 bytes
First seen:2020-10-20 20:19:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d3a2afb703bdefc4273681ac10f9f607 (9 x BazaLoader)
ssdeep 393216:S1qt/8vHxlVvNJbYmb126bbQlv7gSREXQL+e5sOT:B0RlXJ0mb3Q2X+
TLSH 62F6BE4277D68909E0A61730DDB382B81677BD519D35870F328CBA1EAFF36815C66B23
Reporter BFcerdo
Tags:NOSOV SP Z O O signed

Intelligence


File Origin
# of uploads :
1
# of downloads :
74
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Transferring files using the Background Intelligent Transfer Service (BITS)
DNS request
Launching cmd.exe command interpreter
Sending a TCP request to an infection source
Unauthorized injection to a system process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
,
a
b
c
d
e
f
g
h
I
l
m
n
o
p
r
s
t
u
y
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 301377 Sample: Report-Review20-10.exe Startdate: 20/10/2020 Architecture: WINDOWS Score: 48 21 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->21 6 Report-Review20-10.exe 40 2->6         started        9 Report-Review20-10.exe 21 2->9         started        process3 dnsIp4 19 dghns.xyz 34.222.33.48, 443, 49723, 49730 AMAZON-02US United States 6->19 11 WerFault.exe 20 9 6->11         started        13 conhost.exe 6->13         started        15 cmd.exe 6->15         started        17 conhost.exe 9->17         started        process5
Threat name:
Win64.Trojan.Bazaloader
Status:
Malicious
First seen:
2020-10-20 20:20:11 UTC
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
bazarbackdoor
Score:
  10/10
Tags:
discovery backdoor family:bazarbackdoor
Behaviour
Discovers systems in the same network
Modifies system certificate store
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Checks installed software on the system
Looks up external IP address via web service
Blacklisted process makes network request
BazarBackdoor
Unpacked files
SH256 hash:
3e647b84b510487b420bc6eac4cdd8dd246ead5632086b00ff3ccbbaff5efdd9
MD5 hash:
807d6647ee5522b39fbb3a11661da03b
SHA1 hash:
83501a19f40a88f8f4ac3d331b746a3d4c2fcd63
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments