General

  • Target

    footer.exe

  • Size

    281KB

  • Sample

    210302-r6tyl4w3t6

  • MD5

    19ca9bf5eebc9e2f0bd3230f262348fd

  • SHA1

    e8157d7e277ccf04de3476c1845cd597c112786e

  • SHA256

    f2a883a0e4b01c72b0f063df3be5a0102e5c8fbaedc39c8d35c632b200599283

  • SHA512

    636859bd44528e75e5c6c25ad4fce12e0482fdd0de3798c863efbf4326e77db184b1354fc5433672239dee4350a0fc12427acc9a4bedfd17487e96ee5e397d72

Score
10/10

Malware Config

Extracted

Family

buer

C2

verstudiosan.com

Targets

    • Target

      footer.exe

    • Size

      281KB

    • MD5

      19ca9bf5eebc9e2f0bd3230f262348fd

    • SHA1

      e8157d7e277ccf04de3476c1845cd597c112786e

    • SHA256

      f2a883a0e4b01c72b0f063df3be5a0102e5c8fbaedc39c8d35c632b200599283

    • SHA512

      636859bd44528e75e5c6c25ad4fce12e0482fdd0de3798c863efbf4326e77db184b1354fc5433672239dee4350a0fc12427acc9a4bedfd17487e96ee5e397d72

    Score
    10/10
    • Buer

      Buer is a new modular loader first seen in August 2019.

    • Buer Loader

      Detects Buer loader in memory or disk.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks