General
-
Target
3f28f4aebf8fa5fc27f5e3b72dac993f.exe
-
Size
83KB
-
Sample
201218-s2dg893z32
-
MD5
3f28f4aebf8fa5fc27f5e3b72dac993f
-
SHA1
9c03a13ec3c2baa597ae1c759baea9d57ace4599
-
SHA256
146bcd0d720f43d289c66d3a3cdc77e5e5a3d924174ee1993ac6db2cb0ca8026
-
SHA512
13c7007f3918350be0f201ebca153f6967302ac1136ea9cd08b8f6d6b12772c8fc1dab05a1458db059db197fd5b04875e315064b6029dc68d558074a7648b595
Static task
static1
Behavioral task
behavioral1
Sample
3f28f4aebf8fa5fc27f5e3b72dac993f.exe
Resource
win7v20201028
Malware Config
Extracted
buer
softwareconsbank.com
Targets
-
-
Target
3f28f4aebf8fa5fc27f5e3b72dac993f.exe
-
Size
83KB
-
MD5
3f28f4aebf8fa5fc27f5e3b72dac993f
-
SHA1
9c03a13ec3c2baa597ae1c759baea9d57ace4599
-
SHA256
146bcd0d720f43d289c66d3a3cdc77e5e5a3d924174ee1993ac6db2cb0ca8026
-
SHA512
13c7007f3918350be0f201ebca153f6967302ac1136ea9cd08b8f6d6b12772c8fc1dab05a1458db059db197fd5b04875e315064b6029dc68d558074a7648b595
-
Buer Loader
Detects Buer loader in memory or disk.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-