General
-
Target
045a7318a9e2e550208c0c7e9fc805068df19fa73823ac3acaa049a46c4045ee
-
Size
273KB
-
Sample
210301-hljgx9mjf6
-
MD5
1ddd876da3731823324ffa302ddddcba
-
SHA1
2f6d73554c05dbda6cd738a2f38d5cdae2cdd4b7
-
SHA256
045a7318a9e2e550208c0c7e9fc805068df19fa73823ac3acaa049a46c4045ee
-
SHA512
88f453489949abdf85f733b746c7d1983ccd84d8c528840fdd749c207d97acb1ef3b87487e0f4eb3a9965450c51b3bf2230ad0dfff0b6c6b318b24b6c24911c5
Static task
static1
Malware Config
Extracted
buer
shetylo-v1.com
Targets
-
-
Target
045a7318a9e2e550208c0c7e9fc805068df19fa73823ac3acaa049a46c4045ee
-
Size
273KB
-
MD5
1ddd876da3731823324ffa302ddddcba
-
SHA1
2f6d73554c05dbda6cd738a2f38d5cdae2cdd4b7
-
SHA256
045a7318a9e2e550208c0c7e9fc805068df19fa73823ac3acaa049a46c4045ee
-
SHA512
88f453489949abdf85f733b746c7d1983ccd84d8c528840fdd749c207d97acb1ef3b87487e0f4eb3a9965450c51b3bf2230ad0dfff0b6c6b318b24b6c24911c5
-
Buer Loader
Detects Buer loader in memory or disk.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-