MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f44ee4b3572fc6d8c777df55729e61866c5d365be55b2590fa9fcd5f477e888a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 7


Intelligence 7 IOCs YARA 4 File information Comments

SHA256 hash: f44ee4b3572fc6d8c777df55729e61866c5d365be55b2590fa9fcd5f477e888a
SHA3-384 hash: 3be6d279a3dc15e7422b411865eed3fbed63a9b57ac61f57e3bd41facd0b476696db2a7517402dec690bd0eb3a486124
SHA1 hash: 71d6de220855a0a0f62885ca15dde6305769cc94
MD5 hash: b1c5ed8e6463b457d59e868477fbb3a2
humanhash: minnesota-delaware-grey-social
File name:DocsPreviewer.exe
Download: download sample
Signature BazaLoader
File size:238'264 bytes
First seen:2020-10-06 13:19:29 UTC
Last seen:2020-10-06 13:42:27 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e4ccd4b937719ad73acf1cbd3675aa3f (1 x BazaLoader)
ssdeep 6144:PG4lUGHeyXpuXkKU5PIAC0pwkS8sndDFIWm6ihth:PhUxyvJ2j/dDFIWcDh
TLSH 2634E082F3A715C5E0B3A63560A26327EAB27C5487B8ABCFC55591090F32BF0E93D355
Reporter toryclasen
Tags:BazaLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
109
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
72 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Kryptik
Status:
Malicious
First seen:
2020-09-16 23:14:08 UTC
AV detection:
19 of 29 (65.52%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Unpacked files
SH256 hash:
f44ee4b3572fc6d8c777df55729e61866c5d365be55b2590fa9fcd5f477e888a
MD5 hash:
b1c5ed8e6463b457d59e868477fbb3a2
SHA1 hash:
71d6de220855a0a0f62885ca15dde6305769cc94
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BazarBackdoor
Author:@bartblaze
Description:Identifies Bazar backdoor.
Reference:https://www.bleepingcomputer.com/news/security/bazarbackdoor-trickbot-gang-s-new-stealthy-network-hacking-malware/
Rule name:Cobalt_functions
Author:@j0sm1
Description:Detect functions coded with ROR edi,D; Detect CobaltStrike used by differents groups APT
Rule name:crime_win64_backdoor_bazarbackdoor1
Author:@VK_Intel
Description:Detects BazarBackdoor injected 64-bit malware
Reference:https://twitter.com/pancak3lullz/status/1252303608747565057
Rule name:win_bazarbackdoor_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via e-mail link

Comments