General
-
Target
6c7f43434e5db8703c0a47dedeeab976159d8704bfbe2e4ff65405f38d508e9d
-
Size
598KB
-
Sample
200923-xa32lpxv26
-
MD5
8b44470c7ff69ae671ff6e04550ee15f
-
SHA1
123f9a7487cd0fdd772f0e7bb19e70d1ee3a32e7
-
SHA256
6c7f43434e5db8703c0a47dedeeab976159d8704bfbe2e4ff65405f38d508e9d
-
SHA512
0e03e5895bd406ed61c6e5343e184eb5a86d4ee1b195b35be88fea4fee4508b0a525725ec92971f2c0bc1a929d4dda1f0853bc576071cdefef8adb1a5f45e0de
Static task
static1
Behavioral task
behavioral1
Sample
6c7f43434e5db8703c0a47dedeeab976159d8704bfbe2e4ff65405f38d508e9d.exe
Resource
win7
Malware Config
Extracted
buer
https://104.248.83.13/
Targets
-
-
Target
6c7f43434e5db8703c0a47dedeeab976159d8704bfbe2e4ff65405f38d508e9d
-
Size
598KB
-
MD5
8b44470c7ff69ae671ff6e04550ee15f
-
SHA1
123f9a7487cd0fdd772f0e7bb19e70d1ee3a32e7
-
SHA256
6c7f43434e5db8703c0a47dedeeab976159d8704bfbe2e4ff65405f38d508e9d
-
SHA512
0e03e5895bd406ed61c6e5343e184eb5a86d4ee1b195b35be88fea4fee4508b0a525725ec92971f2c0bc1a929d4dda1f0853bc576071cdefef8adb1a5f45e0de
-
Buer Loader
Detects Buer loader in memory or disk.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-