Resubmissions
10-03-2021 13:13
210310-zcbmv5tsq2 1010-03-2021 12:23
210310-g18h95pxda 1010-03-2021 11:45
210310-wzjwq2ky3a 10Analysis
-
max time kernel
123s -
max time network
126s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
10-03-2021 11:45
Static task
static1
Behavioral task
behavioral1
Sample
page.icore.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
page.icore.exe
-
Size
152KB
-
MD5
3b9b37a405585d0625ab124c5a9f0eb6
-
SHA1
36ca288cbaa7ffd064879a2cf0e148f9419993bf
-
SHA256
0b750c8206c470821e39e5250820a8076dba4d037eb98adee00ea865b97bb8e1
-
SHA512
bb9d1ac61c37ba428a6d44911508344680c176b61cc899fb63512a68fa9e99146cb027f06474fdc0c0ed0fd9cd4ae407250c8580effaee684afa0873137475e5
Malware Config
Extracted
Family
buer
C2
hefuaqbanking.com
Signatures
-
Buer Loader 2 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/memory/1108-4-0x0000000040000000-0x000000004000A000-memory.dmp buer behavioral2/memory/1108-3-0x0000000000030000-0x0000000000038000-memory.dmp buer