MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bad9f0b937bc7a74cd5657127e7d1707ce024ccb5434044ef305dffd4307f29b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: bad9f0b937bc7a74cd5657127e7d1707ce024ccb5434044ef305dffd4307f29b
SHA3-384 hash: 6a9e2999d2213b954250622f2713580e4f310e4506120a52074ca1c7529093f959e8acc9415489624da2a1da8b0b4659
SHA1 hash: 65bdde8c108dcafb27b5a5487c6723d52ccc5068
MD5 hash: 1e30713681e7439b059ea95431be132a
humanhash: pip-sodium-idaho-wolfram
File name:bad9f0b937bc7a74cd5657127e7d1707ce024ccb5434044ef305dffd4307f29b
Download: download sample
Signature BazaLoader
File size:1'254'600 bytes
First seen:2020-10-11 05:13:21 UTC
Last seen:2020-10-11 06:16:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 625bb185d26a85a0845504d75f056d0a (5 x BazaLoader)
ssdeep 24576:eNwv3ZN0kW2kRSkWGdAxP3hckQoG6Cj2as:XZN0kW2kRSkWGdAxfhY6ix
Threatray 134 similar samples on MalwareBazaar
TLSH 72457D47F79298AFD51B82328AA787306772F8570205FB1B1A14EF313E229D05F9A774
Reporter JAMESWT_WT
Tags:BazaLoader Infinite Programming Limited signed

Code Signing Certificate

Organisation:DigiCert High Assurance EV Root CA
Issuer:DigiCert High Assurance EV Root CA
Algorithm:sha1WithRSAEncryption
Valid from:Nov 10 00:00:00 2006 GMT
Valid to:Nov 10 00:00:00 2031 GMT
Serial number: 02AC5C266A0B409B8F0B79F2AE462577
Intelligence: 204 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 7431E5F4C3C1CE4690774F0B61E05440883BA9A01ED00BA6ABD7806ED3B118CF
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
178
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending a custom TCP request
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw.evad
Score:
84 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Hijacks the control flow in another process
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Writes to foreign memory regions
Yara detected Keylogger Generic
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Bazaloader
Status:
Malicious
First seen:
2020-10-10 05:33:37 UTC
File Type:
PE+ (Exe)
Extracted files:
4
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
bazarbackdoor
Score:
  10/10
Tags:
backdoor family:bazarbackdoor
Behaviour
Modifies system certificate store
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Blacklisted process makes network request
BazarBackdoor
Unpacked files
SH256 hash:
bad9f0b937bc7a74cd5657127e7d1707ce024ccb5434044ef305dffd4307f29b
MD5 hash:
1e30713681e7439b059ea95431be132a
SHA1 hash:
65bdde8c108dcafb27b5a5487c6723d52ccc5068
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments