General
-
Target
e12b58b042e361d227d4cc3e60e5b5c8ef49c7f70c306d1159c71a7eb335f5cd
-
Size
577KB
-
Sample
200924-ktnssvtyl2
-
MD5
7d8f0a53352c9188acef922dbecfa588
-
SHA1
dc6115bdc6d63f476203e54e40cb35df72d4014d
-
SHA256
e12b58b042e361d227d4cc3e60e5b5c8ef49c7f70c306d1159c71a7eb335f5cd
-
SHA512
6dd3b5d633344f0ee5d59589c28f45ab3647c5d41da27fe39f3025b826b2043a4fc094862762d4080d6546acac4996d25484501b09dc18da597dfb42e6600fa6
Static task
static1
Behavioral task
behavioral1
Sample
e12b58b042e361d227d4cc3e60e5b5c8ef49c7f70c306d1159c71a7eb335f5cd.exe
Resource
win7v200722
Malware Config
Extracted
buer
https://178.62.46.155/
Targets
-
-
Target
e12b58b042e361d227d4cc3e60e5b5c8ef49c7f70c306d1159c71a7eb335f5cd
-
Size
577KB
-
MD5
7d8f0a53352c9188acef922dbecfa588
-
SHA1
dc6115bdc6d63f476203e54e40cb35df72d4014d
-
SHA256
e12b58b042e361d227d4cc3e60e5b5c8ef49c7f70c306d1159c71a7eb335f5cd
-
SHA512
6dd3b5d633344f0ee5d59589c28f45ab3647c5d41da27fe39f3025b826b2043a4fc094862762d4080d6546acac4996d25484501b09dc18da597dfb42e6600fa6
-
Buer Loader
Detects Buer loader in memory or disk.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-