The Team9 loader is a type of malware that infiltrates systems, often without the user's knowledge, through suspicious downloads, emails, or websites. The initial examination focused on the early variant of the Team9 loader, which used specific domains such as bestgame[.]bazar and forgame[.]bazar to deploy its malicious activities. It utilized various URIs to potentially download either 32-bit or 64-bit versions of the Team9 loader or backdoor. These operations were identified by Mutex names such as mn_185445 and {589b7a4a-3776-4e82-8e7d-435471a6c03c}. Additionally, the loader attempted to execute hijacked shortcut files, which would subsequently run an instance of the Team9 loader.
Following the analysis of the early variant, attention was turned to what appeared to be the latest variant of the Team9 loader. This updated version displayed similar functionality but showed signs of evolution in its operation. It used different URIs to potentially download updated 32-bit or 64-bit versions of the Team9 loader or backdoor. Notably, it continued the practice of attempting to execute hijacked shortcut files, thereby running an instance of the Team9 loader.
In parallel, the operational Bazar loader was also examined. This loader shared similarities with the Team9 variants, using specific URIs to potentially download either 32-bit or 64-bit versions of the Team9 backdoor. The identified bazar domains and their URIs were summarized for this Team9 loader variant. All these findings highlight the evolving nature of malware threats and underline the importance of continuous monitoring and updating of cybersecurity measures.
Description last updated: 2024-05-04T18:06:53.800Z