MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f3f7756ced61f3872f07dd25b68f1824d8797730757a9a80bdbbe6522725a2de. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: f3f7756ced61f3872f07dd25b68f1824d8797730757a9a80bdbbe6522725a2de
SHA3-384 hash: 8a56d7434fc90a986f38f7db0b56dab0bc160adaa4dc8c7a71473b850a90ded27a6efd649542d9e616ba34d9669a04e2
SHA1 hash: 0b87f6aac3b24dad66564f321081036f84db0c65
MD5 hash: 5454aed5b071eae739aca427a124b8e8
humanhash: uncle-stream-whiskey-social
File name:Report-Review20-10.exe
Download: download sample
Signature BazaLoader
File size:15'906'456 bytes
First seen:2020-10-20 18:13:33 UTC
Last seen:2020-10-20 18:59:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d3a2afb703bdefc4273681ac10f9f607 (9 x BazaLoader)
ssdeep 393216:Ekkqt/8vHxlVvNJbYmb126bbQlv7gSREXQL+e5sOP:h0RlXJ0mb3Q2X+
Threatray 203 similar samples on MalwareBazaar
TLSH 15F6BE4277D68909E0A61730DDB382B81677BD519D35870F328CBA1EAFF36815C66B23
Reporter BFcerdo
Tags:BazaLoader NOSOV SP Z O O signed

Intelligence


File Origin
# of uploads :
2
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Transferring files using the Background Intelligent Transfer Service (BITS)
DNS request
Launching cmd.exe command interpreter
Sending a TCP request to an infection source
Unauthorized injection to a system process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
72 / 100
Signature
Allocates memory in foreign processes
Hijacks the control flow in another process
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Sample uses process hollowing technique
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Bazaloader
Status:
Malicious
First seen:
2020-10-20 18:15:06 UTC
AV detection:
23 of 27 (85.19%)
Threat level:
  5/5
Result
Malware family:
bazarbackdoor
Score:
  10/10
Tags:
backdoor family:bazarbackdoor
Behaviour
Modifies system certificate store
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Blacklisted process makes network request
BazarBackdoor
Unpacked files
SH256 hash:
f3f7756ced61f3872f07dd25b68f1824d8797730757a9a80bdbbe6522725a2de
MD5 hash:
5454aed5b071eae739aca427a124b8e8
SHA1 hash:
0b87f6aac3b24dad66564f321081036f84db0c65
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments