MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 da64fd26d75960fad54e08303b805dfe4e050c5faea0737ed56cfc6d05af6b88. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: da64fd26d75960fad54e08303b805dfe4e050c5faea0737ed56cfc6d05af6b88
SHA3-384 hash: f4cf785c1f9691fce2b8f335b53a3b453fd15e87514f57a3ba5e1c42a661f1642b35f84220ca6183b441ee02a0b7c0fa
SHA1 hash: 7d2d650cf4dfdea99097a923adf3080e832b9fda
MD5 hash: 4cf6fb8514073319e7759b4f66d13f08
humanhash: kilo-robin-bulldog-idaho
File name:SecuriteInfo.com.FileRepMalware.16835.1352
Download: download sample
Signature BazaLoader
File size:909'824 bytes
First seen:2021-03-23 00:33:55 UTC
Last seen:2021-04-01 03:28:12 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b3ba36bea3f13677848aa4d64134b611 (1 x BazaLoader)
ssdeep 12288:gS2CKZtRhYt6+LHxkokUnS6vQaQKEFyVCax+rACQIz+YTpDR:g1tHYcCRfkUnS6o7HyVtZ03
Threatray 114 similar samples on MalwareBazaar
TLSH F9156B26F2F046A5D063D6BEC6C24669EA7378A0573187CB41809B193F776E25F3A331
Reporter SecuriteInfoCom
Tags:BazaLoader

Intelligence


File Origin
# of uploads :
3
# of downloads :
172
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.FileRepMalware.16835.1352
Verdict:
No threats detected
Analysis date:
2021-03-23 00:36:42 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Changing a file
Sending a UDP request
Running batch commands
Creating a process with a hidden window
Launching a process
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Allocates memory in foreign processes
Creates multiple autostart registry keys
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Uses cmd line tools excessively to alter registry or file data
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 373569 Sample: SecuriteInfo.com.FileRepMal... Startdate: 23/03/2021 Architecture: WINDOWS Score: 92 80 Multi AV Scanner detection for submitted file 2->80 13 SecuriteInfo.com.FileRepMalware.16835.exe 25 2->13         started        15 cmd.exe 1 2->15         started        18 cmd.exe 1 2->18         started        process3 signatures4 20 cmd.exe 1 13->20         started        102 Uses cmd line tools excessively to alter registry or file data 15->102 23 CVA6613.exe 16 15->23         started        25 conhost.exe 15->25         started        27 reg.exe 1 15->27         started        process5 signatures6 82 Uses ping.exe to sleep 20->82 84 Uses cmd line tools excessively to alter registry or file data 20->84 86 Uses ping.exe to check the status of other devices and networks 20->86 29 SecuriteInfo.com.FileRepMalware.16835.exe 17 20->29         started        32 PING.EXE 1 20->32         started        35 conhost.exe 20->35         started        process7 file8 72 C:\Users\user\AppData\Local\...\CVA6613.exe, PE32+ 29->72 dropped 37 cmd.exe 1 29->37         started        78 Uses cmd line tools excessively to alter registry or file data 32->78 signatures9 process10 signatures11 88 Uses ping.exe to sleep 37->88 40 CVA6613.exe 1 16 37->40         started        43 PING.EXE 1 37->43         started        45 conhost.exe 37->45         started        process12 signatures13 90 Multi AV Scanner detection for dropped file 40->90 92 Creates multiple autostart registry keys 40->92 47 cmd.exe 1 40->47         started        50 CVA6613.exe 17 43->50         started        52 reg.exe 1 1 43->52         started        54 conhost.exe 43->54         started        process14 signatures15 104 Uses ping.exe to sleep 47->104 56 CVA6613.exe 17 47->56         started        60 conhost.exe 47->60         started        62 PING.EXE 1 47->62         started        106 Writes to foreign memory regions 50->106 108 Allocates memory in foreign processes 50->108 110 Modifies the context of a thread in another process (thread injection) 50->110 114 2 other signatures 50->114 64 chrome.exe 1 50->64         started        112 Creates multiple autostart registry keys 52->112 process16 dnsIp17 74 3.137.152.31, 443, 49692, 49701 AMAZON-02US United States 56->74 94 Writes to foreign memory regions 56->94 96 Allocates memory in foreign processes 56->96 98 Modifies the context of a thread in another process (thread injection) 56->98 100 2 other signatures 56->100 66 chrome.exe 1 56->66         started        76 54.91.125.140, 443, 49706, 49712 AMAZON-AESUS United States 64->76 68 conhost.exe 64->68         started        signatures18 process19 process20 70 conhost.exe 66->70         started       
Threat name:
Win64.Trojan.Bazar
Status:
Malicious
First seen:
2021-03-22 22:21:57 UTC
AV detection:
11 of 29 (37.93%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
persistence
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Suspicious use of NtCreateUserProcessOtherParentProcess
Unpacked files
SH256 hash:
da64fd26d75960fad54e08303b805dfe4e050c5faea0737ed56cfc6d05af6b88
MD5 hash:
4cf6fb8514073319e7759b4f66d13f08
SHA1 hash:
7d2d650cf4dfdea99097a923adf3080e832b9fda
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Cobalt_functions
Author:@j0sm1
Description:Detect functions coded with ROR edi,D; Detect CobaltStrike used by differents groups APT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

BazaLoader

Executable exe da64fd26d75960fad54e08303b805dfe4e050c5faea0737ed56cfc6d05af6b88

(this sample)

Comments