General
-
Target
Invoice_8003346_D7AB819708954E9278B9F972617DE716.zip
-
Size
29KB
-
Sample
210302-j3ny4dqelx
-
MD5
b34050327e6e474169935eb8943a964b
-
SHA1
d4ffc9b3f18fbcacd4d48bc54018704f3a3aae79
-
SHA256
75c82c63584c1f0abdbb0dbb6eb035e2e9f56110becb07faac43ff7ef5349709
-
SHA512
32780b42c23b6e4917fe7d220210b075afd74e7af5557af7ada4dd9a7ae36357197760fc5be1015ddd48982b5e945e16795a06aab4752a90ed5316f8a0e1ffd5
Static task
static1
Behavioral task
behavioral1
Sample
Invoice_8003346.xlsm
Resource
win7v20201028
Malware Config
Extracted
https://safedot.digital/pp
Extracted
buer
verstudiosan.com
Targets
-
-
Target
Invoice_8003346
-
Size
36KB
-
MD5
d7ab819708954e9278b9f972617de716
-
SHA1
c7b357e405a626b59099375deece067bdcebde10
-
SHA256
982fc27ec64259a058d2786546715915da3b0a8e9a730874656e5aaa642132b6
-
SHA512
2332fe94341446ea7c804e78231bf5a1f81957dabdd6d760d306c7853285bbed9d1b296921fb9d0258c0c424b09b385365182049154e816c9ee77a3ccc1d5ab3
-
Buer Loader
Detects Buer loader in memory or disk.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-