MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 726446fc55650c11f0b38966a30de5b2d0e10805f23cf22f0c13969e2fe2914a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments 1

SHA256 hash: 726446fc55650c11f0b38966a30de5b2d0e10805f23cf22f0c13969e2fe2914a
SHA3-384 hash: b8773846ec6fb9544557a21d3186bd358f31d4e844ac9ab83862097545f7d4e8701373727cb7b84e93e3a8ee61fa091a
SHA1 hash: 0534afbc614f55bc0aea306bca7faa4dbf564364
MD5 hash: ddefdfe7f5eb1458808cb6bddca35978
humanhash: maine-golf-dakota-alabama
File name:sdkdiff.dll
Download: download sample
Signature BazaLoader
File size:386'560 bytes
First seen:2021-05-19 17:50:25 UTC
Last seen:2021-05-19 18:06:18 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6fe17dcc1536f0f716fc4c68063931f7 (1 x BazaLoader)
ssdeep 6144:XfESAjUK/oeTTOhj1kUZAFwqqLbPkzjVRK56leplfmCney7alIUBXiO:XSjUKgHWwzLej7c6UplZnl7alRi
Threatray 105 similar samples on MalwareBazaar
TLSH DC848C3F6B9542BCDCF3D374D9FB5214E621F94886306EAC039154099C31A9379EAB2E
Reporter malware_traffic
Tags:bazacall BazaLoader BazarCall dll

Intelligence


File Origin
# of uploads :
2
# of downloads :
156
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
sdkdiff.dll
Verdict:
No threats detected
Analysis date:
2021-05-19 17:58:58 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
80 / 100
Signature
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 417592 Sample: sdkdiff.dll Startdate: 19/05/2021 Architecture: WINDOWS Score: 80 30 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->30 32 Sigma detected: Suspicious Svchost Process 2->32 7 loaddll64.exe 1 2->7         started        9 rundll32.exe 2->9         started        process3 process4 11 rundll32.exe 15 7->11         started        15 cmd.exe 1 7->15         started        17 rundll32.exe 7->17         started        dnsIp5 26 34.220.99.248, 443, 49725 AMAZON-02US United States 11->26 28 192.168.2.1 unknown unknown 11->28 34 System process connects to network (likely due to code injection or exploit) 11->34 36 Writes to foreign memory regions 11->36 38 Allocates memory in foreign processes 11->38 40 3 other signatures 11->40 19 svchost.exe 14 11->19         started        22 rundll32.exe 15->22         started        signatures6 process7 dnsIp8 24 13.52.231.237, 443, 49733, 49735 AMAZON-02US United States 19->24
Threat name:
Win64.Trojan.BazarLoader
Status:
Malicious
First seen:
2021-05-19 17:50:38 UTC
File Type:
PE+ (Dll)
Extracted files:
8
AV detection:
18 of 28 (64.29%)
Threat level:
  5/5
Result
Malware family:
bazarbackdoor
Score:
  10/10
Tags:
family:bazarbackdoor backdoor
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Blocklisted process makes network request
Bazar/Team9 Backdoor payload
BazarBackdoor
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-19 18:00:30 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0012.001] Anti-Static Analysis::Argument Obfuscation
1) [C0027.009] Cryptography Micro-objective::RC4::Encrypt Data
2) [C0021.004] Cryptography Micro-objective::RC4 PRGA::Generate Pseudo-random Sequence
3) [C0026.002] Data Micro-objective::XOR::Encode Data
5) [C0052] File System Micro-objective::Writes File
6) [C0040] Process Micro-objective::Allocate Thread Local Storage
7) [C0041] Process Micro-objective::Set Thread Local Storage Value
8) [C0018] Process Micro-objective::Terminate Process