MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b24e47b63ec35e9a420b9fbb64106b2f9e6e8a18676e8c79ff2ca67af06f1291. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 4


Intelligence 4 IOCs YARA 1 File information Comments

SHA256 hash: b24e47b63ec35e9a420b9fbb64106b2f9e6e8a18676e8c79ff2ca67af06f1291
SHA3-384 hash: 35299cbfc0190a4d3e22ea9185bb713433b11c8ded16cfa8386060389eac56b5eed058deb125147ab15b72b9442b2106
SHA1 hash: 1270e4a9801c1f5a20caf4ad95f7b53989399241
MD5 hash: ea7575b75f67083c962e3fa326f6299a
humanhash: don-high-north-beer
File name:d4.dll
Download: download sample
Signature BazaLoader
File size:262'656 bytes
First seen:2021-11-10 17:16:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9e9b9dc9a1d7fc9680151ec542607c93 (6 x BazaLoader)
ssdeep 3072:4k1uIY7yyiztyzuyb6Jdn+WTxwMpz8wFLMsR83sOhchfA5+IhOh/oUOmi0Uugawl:7lFBhTPJ3zZ123sMch1xli0fwVLFf
Threatray 22 similar samples on MalwareBazaar
TLSH T16F44D05B63A51C7BE163827DC4634A14DB31B8124A21DBAF03A4876A2F677D09D3EF31
Reporter fr0s7_
Tags:BazaLoader BazarLoader dll exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
171
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
lolaa.dll
Verdict:
No threats detected
Analysis date:
2021-11-10 17:41:47 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
67%
Tags:
greyware monero
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
52 / 100
Signature
Found detection on Joe Sandbox Cloud Basic with higher score
Found potential dummy code loops (likely to delay analysis)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 519422 Sample: d4.dll Startdate: 10/11/2021 Architecture: WINDOWS Score: 52 18 Found detection on Joe Sandbox Cloud Basic with higher score 2->18 7 loaddll64.exe 1 2->7         started        process3 process4 9 rundll32.exe 7->9         started        12 cmd.exe 1 7->12         started        14 rundll32.exe 7->14         started        signatures5 20 Found potential dummy code loops (likely to delay analysis) 9->20 16 rundll32.exe 12->16         started        process6
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Unpacked files
SH256 hash:
b24e47b63ec35e9a420b9fbb64106b2f9e6e8a18676e8c79ff2ca67af06f1291
MD5 hash:
ea7575b75f67083c962e3fa326f6299a
SHA1 hash:
1270e4a9801c1f5a20caf4ad95f7b53989399241
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

BazaLoader

Executable exe b24e47b63ec35e9a420b9fbb64106b2f9e6e8a18676e8c79ff2ca67af06f1291

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments