MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bdb79a86068a90e1271cb869264f2d8f61121e0f29233cfa997aaafebae40143. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: bdb79a86068a90e1271cb869264f2d8f61121e0f29233cfa997aaafebae40143
SHA3-384 hash: 3404be4aedab4e1b40e4cc967ecaadb7540315c842f9d62e59da03dfe42a3d0b5c70883010d60499c9619819ca72eed1
SHA1 hash: 4888520c34ab55a8651d3f937f43e37d3f24c3b5
MD5 hash: fdbf7c7956a7918b7d934852444477b3
humanhash: venus-carolina-pennsylvania-papa
File name:bdb79a86068a90e1271cb869264f2d8f61121e0f29233cfa997aaafebae40143
Download: download sample
Signature BazaLoader
File size:357'536 bytes
First seen:2020-10-08 18:17:53 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 46684113f0db3e006bb794aa0b1419a3 (8 x BazaLoader)
ssdeep 3072:M5nx/zg2+i4nCMs0RvVpfMpGOy3AX/uO/ft99zcHIqmTQ95ygn3o3D5XY:WNdR4dhhVdcGOy3APuOr9zcIqmd7DK
Threatray 126 similar samples on MalwareBazaar
TLSH 08744AC3F555784EF98A037BBCDA8B2572F6A9910A430B0322313F357F22A916BC565D
Reporter JAMESWT_WT
Tags:BazaLoader REGION TOURISM LLC signed

Code Signing Certificate

Organisation:GlobalSign
Issuer:GlobalSign
Algorithm:sha256WithRSAEncryption
Valid from:Mar 18 10:00:00 2009 GMT
Valid to:Mar 18 10:00:00 2029 GMT
Serial number: 04000000000121585308A2
Intelligence: 16 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: CBB522D7B7F127AD6A0113865BDF1CD4102E7D0759AF635A7CF4720DC963C53B
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
136
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Sending a custom TCP request
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw.evad
Score:
68 / 100
Signature
Allocates memory in foreign processes
Hijacks the control flow in another process
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Sample uses process hollowing technique
Writes to foreign memory regions
Yara detected Keylogger Generic
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Bazaloader
Status:
Malicious
First seen:
2020-10-08 18:19:19 UTC
File Type:
PE+ (Exe)
Extracted files:
2
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
bazarbackdoor
Score:
  10/10
Tags:
backdoor family:bazarbackdoor
Behaviour
Modifies system certificate store
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Blacklisted process makes network request
BazarBackdoor
Unpacked files
SH256 hash:
bdb79a86068a90e1271cb869264f2d8f61121e0f29233cfa997aaafebae40143
MD5 hash:
fdbf7c7956a7918b7d934852444477b3
SHA1 hash:
4888520c34ab55a8651d3f937f43e37d3f24c3b5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments