General
-
Target
Inv847.xls
-
Size
298KB
-
Sample
210128-ag9l9qfkxe
-
MD5
5938eec8bed03b1e9f1debc3e949592e
-
SHA1
fd164563202f9de52c6f0eba819322398efdb14f
-
SHA256
22a04ec533322f6dbf3a1e99bc9094e6ecf2c7ce9bb2bfaa801cf30ed4aa0aba
-
SHA512
98b9b5fa2f33ad77d7e3953fa6e571a05b9c28b7ab8c3e5519060f1091e111e168e3124e19b4fc828a8a5d28cdcce795ae553a0200bb01f43c8fb985732e64c5
Behavioral task
behavioral1
Sample
Inv847.xls
Resource
win7v20201028
Malware Config
Extracted
http://88.119.175.189/document.ssl
Extracted
buer
randomresultgenerator.com
Targets
-
-
Target
Inv847.xls
-
Size
298KB
-
MD5
5938eec8bed03b1e9f1debc3e949592e
-
SHA1
fd164563202f9de52c6f0eba819322398efdb14f
-
SHA256
22a04ec533322f6dbf3a1e99bc9094e6ecf2c7ce9bb2bfaa801cf30ed4aa0aba
-
SHA512
98b9b5fa2f33ad77d7e3953fa6e571a05b9c28b7ab8c3e5519060f1091e111e168e3124e19b4fc828a8a5d28cdcce795ae553a0200bb01f43c8fb985732e64c5
-
Buer Loader
Detects Buer loader in memory or disk.
-
Executes dropped EXE
-
Loads dropped DLL
-