MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 82c4c174ad1822ac3c1a55b2e08e9987a9be2294f46508318e50f70566beab5c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 82c4c174ad1822ac3c1a55b2e08e9987a9be2294f46508318e50f70566beab5c
SHA3-384 hash: ba1cdd6e55fbf34a3641195bef74795cd409acdd01851e74cd3a57a74961e53b8bd2b5277ba10835373fded7675078f7
SHA1 hash: 3f96d77673759cd3ebe95f9a98cb5dfabe149281
MD5 hash: 2f011afda00027cbceb04b0d54de9e5e
humanhash: six-pluto-arkansas-alaska
File name:DRQxZrK.dat
Download: download sample
Signature BazaLoader
File size:1'091'079 bytes
First seen:2021-07-20 15:51:37 UTC
Last seen:2021-07-20 16:52:20 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 11816731f87952ce23da086b67eb30cb (2 x BazaLoader, 1 x Heodo)
ssdeep 12288:yS7oCiYqlAOsxk8wf5HUyDKpLHNPXo3gawdCaBSPZC1XZxWjT4lYX:roCsnEkHxD4Tdo3GIyX2T4lYX
Threatray 208 similar samples on MalwareBazaar
TLSH T107354A55BCE104BAC13BF2314896A2A1F6327C6943316BD71F8165BA1AB4BD03A3D7DC
Reporter malware_traffic
Tags:BazaLoader BazarLoader dll exe


Avatar
malware_traffic
Run method: rundll32.exe [filename],StartW

Intelligence


File Origin
# of uploads :
2
# of downloads :
180
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
DRQxZrK.dat
Verdict:
Malicious activity
Analysis date:
2021-07-20 15:33:50 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Bazar Loader BazaLoader
Detection:
malicious
Classification:
troj.evad.spyw
Score:
88 / 100
Signature
Detected Bazar Loader
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Sets debug register (to hijack the execution of another thread)
Sigma detected: CobaltStrike Load by Rundll32
Sigma detected: Copying Sensitive Files with Credential Data
System process connects to network (likely due to code injection or exploit)
Yara detected BazaLoader
Behaviour
Behavior Graph:
Result
Malware family:
bazarloader
Score:
  10/10
Tags:
family:bazarbackdoor family:bazarloader backdoor dropper loader
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Looks up external IP address via web service
Blocklisted process makes network request
Bazar/Team9 Backdoor payload
Bazar/Team9 Loader payload
Bazar Loader
BazarBackdoor
Unpacked files
SH256 hash:
82c4c174ad1822ac3c1a55b2e08e9987a9be2294f46508318e50f70566beab5c
MD5 hash:
2f011afda00027cbceb04b0d54de9e5e
SHA1 hash:
3f96d77673759cd3ebe95f9a98cb5dfabe149281
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments