General
-
Target
de2388449b4dc4bbf7031700d409777ec1fdd7d91e57e9a29eb865b1c95312d0
-
Size
626KB
-
Sample
201003-29pqm2ks9a
-
MD5
4b24d2ad12d3bd600a210c53cd87409f
-
SHA1
0fb8697a1d4fd505eaf401eb20b3318ea0643617
-
SHA256
de2388449b4dc4bbf7031700d409777ec1fdd7d91e57e9a29eb865b1c95312d0
-
SHA512
25ef0cb2b81d70d7c3243051f684732d5261c4bd7a0ac1a783357ae73b22268952737cfe744a7ff0e50c5cb11f58aedc17803a438e39817b31dc011382d43a4f
Static task
static1
Behavioral task
behavioral1
Sample
de2388449b4dc4bbf7031700d409777ec1fdd7d91e57e9a29eb865b1c95312d0.exe
Resource
win7v200722
Malware Config
Extracted
buer
https://itofficemasword.com/
Targets
-
-
Target
de2388449b4dc4bbf7031700d409777ec1fdd7d91e57e9a29eb865b1c95312d0
-
Size
626KB
-
MD5
4b24d2ad12d3bd600a210c53cd87409f
-
SHA1
0fb8697a1d4fd505eaf401eb20b3318ea0643617
-
SHA256
de2388449b4dc4bbf7031700d409777ec1fdd7d91e57e9a29eb865b1c95312d0
-
SHA512
25ef0cb2b81d70d7c3243051f684732d5261c4bd7a0ac1a783357ae73b22268952737cfe744a7ff0e50c5cb11f58aedc17803a438e39817b31dc011382d43a4f
-
Buer Loader
Detects Buer loader in memory or disk.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-