2021-06-15 (WEDNESDAY) - QUICK POST: BAZARCALL (BAZACALL) CAMPAIGN PUSHES BAZARLOADER (BAZALOADER)
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- 2021-06-16-BazarCall-site-to-BazarLoader-1st-run.pcap.zip 9.7 MB (9,656,885 bytes)
- 2021-06-16-BazarCall-site-to-BazarLoader-2nd-run.pcap.zip 5.8 MB (5,833,989 bytes)
- 2021-06-16-BazarLoader-malware.zip 933 kB (932,606 bytes)
NOTES:
- This is a continuation of the BazarCall campaign I wrote about here, except Campo Loader is no longer used in the chain of events.
IMAGES
Shown above: Fake website used to distribute malicious Excel spreadsheet.
Shown above: Using a subscription number from a malicious email to "sign in" to the site.
Shown above: Account information for the intended victim, all fake information (and blurred out in this image).
Shown above: "Cancelling" the subscription will return a malicious spreadsheet.
Shown above: Screenshot of the malicious spreadsheet.
Shown above: Traffic from an infection filtered in Wireshark.
Shown above: A copy of certutil.exe is used to retrieve a DLL for BazarLoader. This is the
first URL it generates.
Shown above: Note the User-Agent: Microsoft-CryptoAPI/10.0, because a copy of certutil.exe is used to retrieve the BazarLoader DLL.
Shown above: Artifacts seen on the Windows host infected with BazarLoader.
Click here to return to the main page.