General
-
Target
a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe
-
Size
24KB
-
Sample
210307-nazyebbhtx
-
MD5
b0ddc235e52fb1c8c174c0624643c647
-
SHA1
41cc34a4a36aba8709a48e7cd302e23e901d6495
-
SHA256
a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e
-
SHA512
da0cd1d6fe1bb0c1d3b5dde9fb07698a1ccc45b9a093bc2a34155fa1c80886944f8d82f7006521738bb30d638da518e8ed0fe895f13eb81b65556accf9875873
Static task
static1
Behavioral task
behavioral1
Sample
a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe
Resource
win7v20201028
Malware Config
Extracted
buer
zeogertabank.com
Targets
-
-
Target
a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe
-
Size
24KB
-
MD5
b0ddc235e52fb1c8c174c0624643c647
-
SHA1
41cc34a4a36aba8709a48e7cd302e23e901d6495
-
SHA256
a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e
-
SHA512
da0cd1d6fe1bb0c1d3b5dde9fb07698a1ccc45b9a093bc2a34155fa1c80886944f8d82f7006521738bb30d638da518e8ed0fe895f13eb81b65556accf9875873
Score6/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-