General
-
Target
6100896142098432.zip
-
Size
114KB
-
Sample
210526-yhyb89d532
-
MD5
c5eeecd41206358a9170022a0fcbab6d
-
SHA1
3e9b807bdad6968f75aa7320c3ea86764238715d
-
SHA256
26832d0d8406b5a706d4f151571c72943d3f19472383b666ecdb1404a8db5459
-
SHA512
3a9c57bdb014af76927f4a64348ad7d12fad8af5393f09dca238fe20c7748c0e1c0c58d4409ba3625208c1c1fd18a8679f8c43a0ce54778af6d5df905cab9533
Static task
static1
Behavioral task
behavioral1
Sample
Electronic_Tracking_INV_#9836582365728523752.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Electronic_Tracking_INV_#9836582365728523752.exe
Resource
win10v20210410
Malware Config
Extracted
buer
https://specialhosting.ga/
Targets
-
-
Target
Electronic_Tracking_INV_#9836582365728523752.exe
-
Size
245KB
-
MD5
64f86981c7450dfd2c3915f213fc6720
-
SHA1
5410d0e8569f0936b32de3199e8a187d6227fc1f
-
SHA256
a1bdc2ca2e359ac7d5c26afb3cd89bb39285b8a8acc5876e691ceb4ba807b704
-
SHA512
02e9e2e41a96a4e0279de44c5cdd7c18a4d08966e0e2ba9979d929f0fa5a902db1ceb3f2eb8a73d97725eed917f9e57d11999a0218f3f286908bf7e731931b22
Score10/10-
Modifies WinLogon for persistence
-
Buer Loader
Detects Buer loader in memory or disk.
-
Executes dropped EXE
-
Deletes itself
-
Suspicious use of SetThreadContext
-