MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f29dbde41d19fa55ca3cd077df6833441aca6df5f1cfccbca9ed9554214263da. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: f29dbde41d19fa55ca3cd077df6833441aca6df5f1cfccbca9ed9554214263da
SHA3-384 hash: d84d14c619f0e5f36c2aafaac0d4d83f8a0fa578d2b0c5fb29b49deb6f0ff80fafe735fe3326d68e1d641fd54df21281
SHA1 hash: c79de0a2ecb71ef8eb029d321da8347313a7b37f
MD5 hash: 787d4d0708ef2412f504067f92102d80
humanhash: nitrogen-monkey-apart-hotel
File name:0x00020000000155fc-286.dll
Download: download sample
Signature BazaLoader
File size:349'322 bytes
First seen:2021-10-21 14:32:13 UTC
Last seen:2021-10-21 14:39:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 8fc81352ac718681e376edb5b78a04b3 (5 x BazaLoader)
ssdeep 6144:u55lc2c9mVV7pM3RRVru0hoy4Ip9b/mOawHSjQJ:u555c9A2DVru0hoy3p9SVjM
Threatray 56 similar samples on MalwareBazaar
TLSH T1EF746CA1A5D13990E9C2D87E861BB372EA4B54332FA1E0C271A70BD3452F4D5DF52E23
Reporter pr0xylife
Tags:BazaLoader exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
156
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Connection attempt
Sending a custom TCP request
DNS request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Bazar Loader
Detection:
malicious
Classification:
spyw.evad
Score:
76 / 100
Signature
Allocates memory in foreign processes
Detected Bazar Loader
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 507096 Sample: 0x00020000000155fc-286.dll Startdate: 21/10/2021 Architecture: WINDOWS Score: 76 34 Detected Bazar Loader 2->34 36 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->36 7 loaddll64.exe 1 2->7         started        process3 process4 9 regsvr32.exe 13 7->9         started        13 iexplore.exe 1 73 7->13         started        15 cmd.exe 1 7->15         started        17 rundll32.exe 7->17         started        dnsIp5 32 46.101.144.128, 443, 49782 DIGITALOCEAN-ASNUS Netherlands 9->32 38 System process connects to network (likely due to code injection or exploit) 9->38 40 Writes to foreign memory regions 9->40 42 Allocates memory in foreign processes 9->42 44 2 other signatures 9->44 19 chrome.exe 1 9->19         started        21 iexplore.exe 2 148 13->21         started        24 rundll32.exe 15->24         started        signatures6 process7 dnsIp8 26 dart.l.doubleclick.net 172.217.168.38, 443, 49835, 49836 GOOGLEUS United States 21->26 28 geolocation.onetrust.com 104.20.185.68, 443, 49800, 49801 CLOUDFLARENETUS United States 21->28 30 10 other IPs or domains 21->30
Threat name:
Win64.Trojan.AgentAGen
Status:
Malicious
First seen:
2021-10-21 14:33:05 UTC
AV detection:
12 of 28 (42.86%)
Threat level:
  5/5
Result
Malware family:
bazarloader
Score:
  10/10
Tags:
family:bazarloader dropper loader
Behaviour
Bazar/Team9 Loader payload
Bazar Loader
Unpacked files
SH256 hash:
f29dbde41d19fa55ca3cd077df6833441aca6df5f1cfccbca9ed9554214263da
MD5 hash:
787d4d0708ef2412f504067f92102d80
SHA1 hash:
c79de0a2ecb71ef8eb029d321da8347313a7b37f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments