General
-
Target
85da0e15d51bbb0ff7efe69d6cf0e1858efaa0ba1993222868ee71d3d755e124
-
Size
35KB
-
Sample
201109-k5prgaf7c2
-
MD5
6f14c56f141d8eb8ccc58f6e3f341426
-
SHA1
70d9bc4ded0b7546ad7ee6d4873a5f5f58bc04e7
-
SHA256
85da0e15d51bbb0ff7efe69d6cf0e1858efaa0ba1993222868ee71d3d755e124
-
SHA512
c91fb3355543beb3040ee4ef1287f1725f834279cc58786fe37fe0859612198b69e971c9910d379254018b51d0058749ae6199e28aec15d9ef5ce76fd3bbe5bd
Static task
static1
Behavioral task
behavioral1
Sample
85da0e15d51bbb0ff7efe69d6cf0e1858efaa0ba1993222868ee71d3d755e124.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
85da0e15d51bbb0ff7efe69d6cf0e1858efaa0ba1993222868ee71d3d755e124.exe
Resource
win10v20201028
Malware Config
Extracted
buer
https://gstatiknetiplist.cc/
https://gstatiknetiplist.com/
Targets
-
-
Target
85da0e15d51bbb0ff7efe69d6cf0e1858efaa0ba1993222868ee71d3d755e124
-
Size
35KB
-
MD5
6f14c56f141d8eb8ccc58f6e3f341426
-
SHA1
70d9bc4ded0b7546ad7ee6d4873a5f5f58bc04e7
-
SHA256
85da0e15d51bbb0ff7efe69d6cf0e1858efaa0ba1993222868ee71d3d755e124
-
SHA512
c91fb3355543beb3040ee4ef1287f1725f834279cc58786fe37fe0859612198b69e971c9910d379254018b51d0058749ae6199e28aec15d9ef5ce76fd3bbe5bd
Score10/10-
Modifies WinLogon for persistence
-
Buer Loader
Detects Buer loader in memory or disk.
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-