MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d3fa691696a8909efdd54e5cd4bb8310aaa72a5b3a7628700e3404494214bda9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazarCall


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: d3fa691696a8909efdd54e5cd4bb8310aaa72a5b3a7628700e3404494214bda9
SHA3-384 hash: ea2433fa4eb1d7166ec48f2c94415bd5ec115b8e1c608b09c34503a3d4b4fcc396fdc5118337259f66228958c7a8243c
SHA1 hash: 64c711c1b2d2297a17a548778f8bfa3ed7fae232
MD5 hash: b5cb5ac79b76d8db06f631e4ab461074
humanhash: iowa-single-item-double
File name:SecuriteInfo.com.TrojanDropper.Sysn.fyj.15394.3382
Download: download sample
Signature BazarCall
File size:625'152 bytes
First seen:2021-03-26 02:43:24 UTC
Last seen:2021-04-01 03:16:21 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash caf450a960e7f9ebf1978c5af6aec15e (1 x BazarCall)
ssdeep 12288:C+C6AqiwyTmO35P0bWHeeqcz6q8hpOG+WjsNTPokm:CYy6O30W+e61CpWjeTQf
Threatray 91 similar samples on MalwareBazaar
TLSH BED4AD57B2A48DB5E423D27A8993874AEA737C305B35D3CB1250A70E6F336E15D3A321
Reporter SecuriteInfoCom
Tags:BazarCall

Intelligence


File Origin
# of uploads :
2
# of downloads :
146
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
dwug.exe
Verdict:
Suspicious activity
Analysis date:
2021-03-25 23:59:46 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Changing a file
Sending a custom TCP request
Sending a UDP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
BazarBackdoor
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
84 / 100
Signature
Allocates memory in foreign processes
Hijacks the control flow in another process
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Bazar
Status:
Malicious
First seen:
2021-03-26 00:08:36 UTC
AV detection:
7 of 29 (24.14%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
d3fa691696a8909efdd54e5cd4bb8310aaa72a5b3a7628700e3404494214bda9
MD5 hash:
b5cb5ac79b76d8db06f631e4ab461074
SHA1 hash:
64c711c1b2d2297a17a548778f8bfa3ed7fae232
Malware family:
BazarLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Cobalt_functions
Author:@j0sm1
Description:Detect functions coded with ROR edi,D; Detect CobaltStrike used by differents groups APT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

BazarCall

Executable exe d3fa691696a8909efdd54e5cd4bb8310aaa72a5b3a7628700e3404494214bda9

(this sample)

  
Delivery method
Distributed via web download

Comments