Resubmissions
05-02-2021 09:03
210205-vb23bmqh2n 1005-02-2021 08:52
210205-8n4dfc6e2j 1005-02-2021 00:36
210205-pj4d5hk8ys 10Analysis
-
max time kernel
13s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
05-02-2021 00:36
Static task
static1
Behavioral task
behavioral1
Sample
zrmbk.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
zrmbk.exe
-
Size
97KB
-
MD5
9168378e6849f1547829afc3f0357f6a
-
SHA1
097d64d174b8243434f026f2fd24e536cc3686bc
-
SHA256
d333192a262ceaec75b68c0e6082cf868eb77a0e81010f590451814770b6ce31
-
SHA512
4c69f85af810334506dd1b8d2e409e30ce8c8471073b56bece6312dcda109705720c41255d49e1d7976b847f4ca586113208fdec805aac2398fc890fc230754b
Malware Config
Extracted
Family
buer
C2
officewestunionbank.com
bankcreditsign.com
Signatures
-
Buer Loader 2 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/memory/1052-4-0x0000000040000000-0x0000000040009000-memory.dmp buer behavioral2/memory/1052-3-0x0000000000030000-0x0000000000037000-memory.dmp buer