MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f4f02f78b8d89ed5063773985d4ad7b4c9205417b34787fb945f739134a85a8b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BuerLoader


Vendor detections: 6


Intelligence 6 IOCs YARA 2 File information Comments

SHA256 hash: f4f02f78b8d89ed5063773985d4ad7b4c9205417b34787fb945f739134a85a8b
SHA3-384 hash: 14c102b7dab3fcbaaca90c8dbd190e39edf2835f7e38e5eb2e312f568070effa9ca867a7f20df70327e6d7e93987444e
SHA1 hash: 9d0ee3d8896911c2743ff89c72c30639f0851f52
MD5 hash: e23246d5a16fd344dfd2fc7177d43890
humanhash: leopard-pennsylvania-carpet-indigo
File name:v.dll
Download: download sample
Signature BuerLoader
File size:3'329'024 bytes
First seen:2021-02-16 22:41:53 UTC
Last seen:2021-02-17 20:47:23 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 7df22f0d37eecce615162afa855d2604 (1 x BuerLoader)
ssdeep 49152:GYRxMUVRngWxp5Czu06spJDJXv2Suyic6346LE3Vtj2RwA+M:GuS0RnNYss5XvMy0346g3emA
Threatray 16 similar samples on MalwareBazaar
TLSH 2BF512B35A74120AD1E5CC39453BBDB5B1F546A38E82EDB86EDD5DC528328E4A303C87
Reporter James_inthe_box
Tags:BuerLoader dll

Intelligence


File Origin
# of uploads :
3
# of downloads :
140
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Sending a UDP request
Creating a file in the %temp% directory
Deleting a recently created file
Changing a file
DHCP request
Modifying a system file
DNS request
Sending an HTTP GET request
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Buer Loader
Detection:
malicious
Classification:
troj.evad
Score:
80 / 100
Signature
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Detected VMProtect packer
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected Buer Loader
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Mansabo
Status:
Malicious
First seen:
2021-02-16 22:37:50 UTC
File Type:
PE (Dll)
AV detection:
9 of 29 (31.03%)
Threat level:
  5/5
Unpacked files
SH256 hash:
56e68459238d8d322421ca78a2b811955ac515d80983e362bb837602014fc6de
MD5 hash:
e8ade9242da7fe20e36342d30dc19677
SHA1 hash:
b0d2df3e709b7ac0c404779f13bca85cb46a04ed
SH256 hash:
f4f02f78b8d89ed5063773985d4ad7b4c9205417b34787fb945f739134a85a8b
MD5 hash:
e23246d5a16fd344dfd2fc7177d43890
SHA1 hash:
9d0ee3d8896911c2743ff89c72c30639f0851f52
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments