General
-
Target
9ec189cd724b3f7007266e5bae55a5b282849f3221df6b2e2b9aad3390594c17
-
Size
1.3MB
-
Sample
201011-kqxd2ny51x
-
MD5
87f0180d068e273e554db3e2c5ed34b8
-
SHA1
b60648cb7e2f555be32ca13ef38cc2267e062e1c
-
SHA256
9ec189cd724b3f7007266e5bae55a5b282849f3221df6b2e2b9aad3390594c17
-
SHA512
ef51441152a84b2a4481f11eb2a149d957f87d0c88cd0a9e1cf88924dc5587e43250725fd010147989550c4cbf74532a9e251ad036b71c17e70d809811fdf402
Static task
static1
Behavioral task
behavioral1
Sample
9ec189cd724b3f7007266e5bae55a5b282849f3221df6b2e2b9aad3390594c17.exe
Resource
win7v200722
Malware Config
Extracted
buer
https://supsuncorner.com/
Targets
-
-
Target
9ec189cd724b3f7007266e5bae55a5b282849f3221df6b2e2b9aad3390594c17
-
Size
1.3MB
-
MD5
87f0180d068e273e554db3e2c5ed34b8
-
SHA1
b60648cb7e2f555be32ca13ef38cc2267e062e1c
-
SHA256
9ec189cd724b3f7007266e5bae55a5b282849f3221df6b2e2b9aad3390594c17
-
SHA512
ef51441152a84b2a4481f11eb2a149d957f87d0c88cd0a9e1cf88924dc5587e43250725fd010147989550c4cbf74532a9e251ad036b71c17e70d809811fdf402
-
Buer Loader
Detects Buer loader in memory or disk.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-