Names | BazarBackdoor BazarLoader | |
Category | Malware | |
Type | Backdoor, Downloader | |
Description | (BleepingComputer) After a victim launches the downloaded file, the loader will sleep for a short period of time and then connect to command and control servers to check-in and download the backdoor payload. To get the address of the command and control servers, BazarLoader will use the Emercoin decentralized DNS resolution service to resolve various hostnames that use the 'bazar' domain. The 'bazar' domain can only be utilized on Emercoin's DNS servers, and as it is decentralized, it makes it difficult, if not impossible, for law enforcement to seize the hostname. After the payload is downloaded, it will be filelessly injected into the C:\Windows\system32\svchost.exe process. Security researcher Vitali Kremez told BleepingComputer that this is done using the Process Hollowing and Process Doppelgänging techniques. After a period of time, both Kremez and James have told BleepingComputer that the backdoor will download and execute the Cobalt Strike penetration testing and post-exploitation toolkit on the victim's machine. | |
Information | <https://www.bleepingcomputer.com/news/security/bazarbackdoor-trickbot-gang-s-new-stealthy-network-hacking-malware/> <https://www.cybereason.com/blog/a-bazar-of-tricks-following-team9s-development-cycles> <https://cofense.com/the-ryuk-threat-why-bazarbackdoor-matters-most/> <https://www.advanced-intel.com/post/anatomy-of-attack-inside-bazarbackdoor-to-ryuk-ransomware-one-group-via-cobalt-strike> |
Last change to this tool card: 05 January 2021
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
Other groups | |||||
UNC1878 | [Unknown] | 2020 | |||
Wizard Spider, Gold Blackburn | ![]() | 2014-Nov 2020 | ![]() |
2 groups listed (0 APT, 2 other, 0 unknown)
Thailand Computer Emergency Response Team (ThaiCERT) Follow us on![]() ![]() |
Report incidents |
|
![]() |
+66 (0)2-123-1234 | |
![]() |
report@thaicert.or.th | |
![]() |
Download PGP key |