MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ed0c061e3de7a017b87fab71f5b1d9e9fe8b8ac416e7d9840fd59d198b4869cb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: ed0c061e3de7a017b87fab71f5b1d9e9fe8b8ac416e7d9840fd59d198b4869cb
SHA3-384 hash: 3c80560461d2a09db729e672e67e66c900b86c00c994223907273358fb60ae131a8d75794c7577e54a946bc77fb20a92
SHA1 hash: e3bfaaf32386553768022a086d95e83fa571741a
MD5 hash: ba40d5aa9ba2419c25e7a0d8dfbb4600
humanhash: mountain-jersey-nebraska-enemy
File name:Gsdqz.dat
Download: download sample
Signature BazaLoader
File size:585'748 bytes
First seen:2021-10-13 18:04:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d6bb10bc6ca8af288c82745738f7c1db (1 x BazaLoader)
ssdeep 6144:umUCbQC4Kd+yp5+H/OfQ1ezKfzEJ60vPeuG7T3VoOkcnwP1t6O/eVbnn6Y6726xV:bQC4KUkgH/Ofzy70vPfEQY675f2hIaYP
Threatray 33 similar samples on MalwareBazaar
TLSH T11DC49D05A6604473E81B923989A28E4BE2E17E597731D30FC3E1AF6E6F3B3535418F19
File icon (PE):PE icon
dhash icon 71b119dcce576333 (3'570 x Heodo, 203 x TrickBot, 19 x Gh0stRAT)
Reporter infosecfu
Tags:BazaLoader dll exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
307
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Gsdqz.dat
Verdict:
No threats detected
Analysis date:
2021-10-13 18:17:22 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Transferring files using the Background Intelligent Transfer Service (BITS)
Launching a process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware keylogger overlay packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
NetSupport Ltd
Verdict:
Suspicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
80 / 100
Signature
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Sample uses process hollowing technique
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
System process connects to network (likely due to code injection or exploit)
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 502345 Sample: Gsdqz.dat Startdate: 13/10/2021 Architecture: WINDOWS Score: 80 47 Sigma detected: Suspicious Svchost Process 2->47 7 loaddll64.exe 1 2->7         started        9 rundll32.exe 2->9         started        process3 process4 11 regsvr32.exe 28 7->11         started        15 iexplore.exe 2 83 7->15         started        17 cmd.exe 1 7->17         started        19 2 other processes 7->19 dnsIp5 39 161.35.66.76, 443, 49751, 49902 DIGITALOCEAN-ASNUS United States 11->39 41 164.90.211.10, 443, 49775, 49853 DIGITALOCEAN-ASNUS United States 11->41 45 12 other IPs or domains 11->45 51 System process connects to network (likely due to code injection or exploit) 11->51 53 Contains functionality to inject code into remote processes 11->53 55 Sets debug register (to hijack the execution of another thread) 11->55 57 5 other signatures 11->57 21 svchost.exe 11->21         started        43 192.168.2.1 unknown unknown 15->43 25 iexplore.exe 7 155 15->25         started        27 rundll32.exe 17->27         started        signatures6 process7 dnsIp8 29 api.opennicproject.org 21->29 31 api.opennic.org 21->31 49 System process connects to network (likely due to code injection or exploit) 21->49 33 cm.g.doubleclick.net 142.250.203.98, 443, 49830, 49831 GOOGLEUS United States 25->33 35 dart.l.doubleclick.net 216.58.215.230, 443, 49849, 49850 GOOGLEUS United States 25->35 37 23 other IPs or domains 25->37 signatures9
Threat name:
Win64.Trojan.GenericML
Status:
Malicious
First seen:
2021-10-13 18:06:45 UTC
AV detection:
5 of 45 (11.11%)
Threat level:
  5/5
Result
Malware family:
bazarloader
Score:
  10/10
Tags:
family:bazarloader dropper loader
Behaviour
Bazar/Team9 Loader payload
Bazar Loader
Unpacked files
SH256 hash:
ed0c061e3de7a017b87fab71f5b1d9e9fe8b8ac416e7d9840fd59d198b4869cb
MD5 hash:
ba40d5aa9ba2419c25e7a0d8dfbb4600
SHA1 hash:
e3bfaaf32386553768022a086d95e83fa571741a
Malware family:
BazarLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments