General
-
Target
page.icore
-
Size
152KB
-
Sample
210310-wzjwq2ky3a
-
MD5
3b9b37a405585d0625ab124c5a9f0eb6
-
SHA1
36ca288cbaa7ffd064879a2cf0e148f9419993bf
-
SHA256
0b750c8206c470821e39e5250820a8076dba4d037eb98adee00ea865b97bb8e1
-
SHA512
bb9d1ac61c37ba428a6d44911508344680c176b61cc899fb63512a68fa9e99146cb027f06474fdc0c0ed0fd9cd4ae407250c8580effaee684afa0873137475e5
Static task
static1
Behavioral task
behavioral1
Sample
page.icore.exe
Resource
win7v20201028
Malware Config
Extracted
buer
hefuaqbanking.com
Targets
-
-
Target
page.icore
-
Size
152KB
-
MD5
3b9b37a405585d0625ab124c5a9f0eb6
-
SHA1
36ca288cbaa7ffd064879a2cf0e148f9419993bf
-
SHA256
0b750c8206c470821e39e5250820a8076dba4d037eb98adee00ea865b97bb8e1
-
SHA512
bb9d1ac61c37ba428a6d44911508344680c176b61cc899fb63512a68fa9e99146cb027f06474fdc0c0ed0fd9cd4ae407250c8580effaee684afa0873137475e5
-
Buer Loader
Detects Buer loader in memory or disk.
-