Behavioral task
behavioral1
Sample
1140-55-0x000000001BD20000-0x000000001C11E000-memory.exe
Resource
win7-20220812-en
General
-
Target
1140-55-0x000000001BD20000-0x000000001C11E000-memory.dmp
-
Size
4.0MB
-
MD5
18cd1c070e1512dad36082a6db5a1f5d
-
SHA1
a3658f25e283e3df1be4a3deab4eae8435aeeef7
-
SHA256
d83eb977fd0bf85f46a32cae0bf864202325ee1b2897aeb6f879da84a18db365
-
SHA512
4a8aac1e5f58cd15c260fe5bf884cda5b59ac892daa1e948e24311353c8759985c0ae3036a8c4883c70273ad9764f6df7fea1086bede2d59a2e4f03701baa23a
-
SSDEEP
49152:VNDFFPJu8fBsVE6ij+RNg+UKpBvtqB3m1RC3:TzP88fBsnZTgOtqB3m1RC3
Malware Config
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule sample loaderbot -
Loaderbot family
Files
-
1140-55-0x000000001BD20000-0x000000001C11E000-memory.dmp.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ