ThaiCERT    ETDA    MDES
Report
Search
Home > List all groups > List all tools > List all groups using tool BazarBackdoor

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: BazarBackdoor

NamesBazarBackdoor
BazarLoader
BEERBOT
BazarCall
KEGTAP
Team9Backdoor
bazaloader
CategoryMalware
TypeBackdoor, Downloader
Description(BleepingComputer) After a victim launches the downloaded file, the loader will sleep for a short period of time and then connect to command and control servers to check-in and download the backdoor payload.
To get the address of the command and control servers, BazarLoader will use the Emercoin decentralized DNS resolution service to resolve various hostnames that use the 'bazar' domain. The 'bazar' domain can only be utilized on Emercoin's DNS servers, and as it is decentralized, it makes it difficult, if not impossible, for law enforcement to seize the hostname.

After the payload is downloaded, it will be filelessly injected into the C:\Windows\system32\svchost.exe process. Security researcher Vitali Kremez told BleepingComputer that this is done using the Process Hollowing and Process Doppelgänging techniques.

After a period of time, both Kremez and James have told BleepingComputer that the backdoor will download and execute the Cobalt Strike penetration testing and post-exploitation toolkit on the victim's machine.
Information<https://www.bleepingcomputer.com/news/security/bazarbackdoor-trickbot-gang-s-new-stealthy-network-hacking-malware/>
<https://www.cybereason.com/blog/a-bazar-of-tricks-following-team9s-development-cycles>
<https://cofense.com/the-ryuk-threat-why-bazarbackdoor-matters-most/>
<https://www.advanced-intel.com/post/anatomy-of-attack-inside-bazarbackdoor-to-ryuk-ransomware-one-group-via-cobalt-strike>
<https://cofense.com/blog/bazarbackdoor-stealthy-infiltration>
<https://www.bleepingcomputer.com/news/security/trickbots-bazarbackdoor-malware-is-now-coded-in-nim-to-evade-antivirus/>
<https://www.fortinet.com/blog/threat-research/new-bazar-trojan-variant-is-being-spread-in-recent-phishing-campaign-part-I>
<https://www.fortinet.com/blog/threat-research/new-bazar-trojan-variant-is-being-spread-in-recent-phishing-campaign-part-II>
<https://www.cert.ssi.gouv.fr/uploads/CERTFR-2021-CTI-006.pdf>
<https://thedfirreport.com/2021/03/08/bazar-drops-the-anchor/>
<https://news.sophos.com/en-us/2021/04/15/bazarloader/>
<https://unit42.paloaltonetworks.com/bazarloader-malware/>
<http://www.intel471.com/blog/cobalt-strike-cybercriminals-trickbot-qbot-hancitor>
<https://www.intezer.com/blog/malware-analysis/wrapping-up-a-year-of-infamous-bazar-campaigns/>
<https://beta.darkreading.com/attacks-breaches/microsoft-tracks-new-bazacall-malware-campaign>
<https://cofense.com/blog/nested-files-evade-segs/>
<https://cyware.com/news/bazarbackdoor-uses-new-obfuscation-tricks-to-challenge-security-369b4c0b>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.bazarbackdoor>

Last change to this tool card: 08 August 2021

Download this tool card in JSON format

Previous: Bateleur
Next: BBSRAT

All groups using tool BazarBackdoor

ChangedNameCountryObserved

APT groups

 Wizard Spider, Gold BlackburnRussia2014-Aug 2021 HOTX

Other groups

 UNC1878[Unknown]2020 

2 groups listed (1 APT, 1 other, 0 unknown)

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
E-mail report@thaicert.or.th
PGP Download PGP key