General
-
Target
Invoice106237.xls
-
Size
254KB
-
Sample
210202-a3ywsl68re
-
MD5
d99588c5238094b5c43ade66067fac80
-
SHA1
9fba7c1073ab55f4f4373f9df4af60602b487560
-
SHA256
dd6a316b8476993c98d452e05bae3441426cd074a165dab259183cfb64a7b23c
-
SHA512
e23f46341bd206219522fbb18154d3d48b5835281b107d2dba215e985e08b210307ff3dd54a39724045ec5a7427a76c4985e920e68f7c12feff53673adea8a24
Behavioral task
behavioral1
Sample
Invoice106237.xls
Resource
win7v20201028
Malware Config
Extracted
https://goldforexinstitute.com/wp-admin/images/gif/faxer.txt
Extracted
buer
tokacpebanking.com
Targets
-
-
Target
Invoice106237.xls
-
Size
254KB
-
MD5
d99588c5238094b5c43ade66067fac80
-
SHA1
9fba7c1073ab55f4f4373f9df4af60602b487560
-
SHA256
dd6a316b8476993c98d452e05bae3441426cd074a165dab259183cfb64a7b23c
-
SHA512
e23f46341bd206219522fbb18154d3d48b5835281b107d2dba215e985e08b210307ff3dd54a39724045ec5a7427a76c4985e920e68f7c12feff53673adea8a24
-
Buer Loader
Detects Buer loader in memory or disk.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-