Analysis
-
max time kernel
2s -
max time network
15s -
platform
windows7_x64 -
resource
win7 -
submitted
23-09-2020 06:28
Static task
static1
Behavioral task
behavioral1
Sample
67c08d2a21a3ade47ed790aa65ef7cbb117e32300b432f5be97d5ff13c745247.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
67c08d2a21a3ade47ed790aa65ef7cbb117e32300b432f5be97d5ff13c745247.exe
-
Size
239KB
-
MD5
f447d7a2f7cfb24db6b3c42716b16457
-
SHA1
6c898d8bc1b2311859b34df36e0ba9c392a30b9f
-
SHA256
67c08d2a21a3ade47ed790aa65ef7cbb117e32300b432f5be97d5ff13c745247
-
SHA512
b303f0d106ce5fadda89346e78516ca8251dd532f1efa2540085b665d9de6dbba03c77bdc7007294a893f62a5e1fe22790513b97261eb6ba4eed1aac4d870e1a
Malware Config
Extracted
Family
buer
C2
https://104.248.83.13/
Signatures
-
Buer Loader 2 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral1/memory/1324-0-0x0000000000250000-0x000000000025F000-memory.dmp buer behavioral1/memory/1324-1-0x0000000040000000-0x000000004000C000-memory.dmp buer