General
-
Target
scpload.exe
-
Size
110KB
-
Sample
210203-eamx4rtnnx
-
MD5
63e7beb498ebe532263c977d71f664c3
-
SHA1
ba5e80517cef90a4fe50753a2b3c134a400b478c
-
SHA256
7d502dec22302537441fdc43c60eed70bcde7f97bb14414e7859439d2ec7914f
-
SHA512
cd4385b9e1bfbe504fd1d69388e5839fd196801b9c5f41e020d39083092d7f402662753464626d633b06fe1f0bb97e6360f93602f34e4eb88dfd06ba9fce6758
Static task
static1
Behavioral task
behavioral1
Sample
scpload.exe
Resource
win7v20201028
Malware Config
Extracted
buer
webgraitupeople.com
Targets
-
-
Target
scpload.exe
-
Size
110KB
-
MD5
63e7beb498ebe532263c977d71f664c3
-
SHA1
ba5e80517cef90a4fe50753a2b3c134a400b478c
-
SHA256
7d502dec22302537441fdc43c60eed70bcde7f97bb14414e7859439d2ec7914f
-
SHA512
cd4385b9e1bfbe504fd1d69388e5839fd196801b9c5f41e020d39083092d7f402662753464626d633b06fe1f0bb97e6360f93602f34e4eb88dfd06ba9fce6758
-
Buer Loader
Detects Buer loader in memory or disk.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-